{"id":6512,"date":"2022-07-23T07:08:54","date_gmt":"2022-07-22T23:08:54","guid":{"rendered":"https:\/\/x-phy.com\/?p=6512"},"modified":"2022-07-23T07:08:54","modified_gmt":"2022-07-22T23:08:54","slug":"public-wifi-vulnerability","status":"publish","type":"post","link":"https:\/\/x-phy.com\/public-wifi-vulnerability\/","title":{"rendered":"Public Wifi &#8211; A Use Case in Outdoor Usage"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"6512\" class=\"elementor elementor-6512\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-47451277 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"47451277\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-8d614e1\" data-id=\"8d614e1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2d430411 elementor-widget elementor-widget-text-editor\" data-id=\"2d430411\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The major security concern for Public internet is the <a href=\"https:\/\/x-phy.com\/public-wifi-vulnerability\/\">Wifi vulnerability<\/a> to hacking. Rogue users can easily crack the wifi key to access and control the <a href=\"https:\/\/x-phy.com\/category\/blog\/incident-response\/\">wifi router<\/a> to redirect the genuine users to malicious websites. Just like that, Kevin\u2019s laptop was on the verge of being attacked while he was at a coffee shop in a meeting with a client. While discussing a project, he connected with the <a href=\"https:\/\/x-phy.com\/public-wifi-vulnerability\/\">public wifi<\/a> to research on the internet.<\/p><p>A hacker was also connected to the same network. Utilizing the wifi vulnerability to hacking, he cracked the Wifi password and gained access to the Wifi router. Now he can monitor all the user activity sharing the same network. He particularly targeted the users using <a href=\"https:\/\/x-phy.com\/products\/endpoint-security\/secure-ssd\/\">NVMe protocol-based storage<\/a> on their systems. He performed a MITM attack to redirect users into a malicious website by altering the DNS settings.<br \/>Kevin was redirected to that malicious website and the hacker was able to steal his login credentials. Being unaware of the attack, Kevin continued working online using the Wifi.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-1bcd8262\" data-id=\"1bcd8262\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1f3fd5bc elementor-widget elementor-widget-text-editor\" data-id=\"1f3fd5bc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>With the java applet, the hacker tried to unroot a second boot loader, to upload <a href=\"https:\/\/x-phy.com\/importance-of-firmware-based-cyber-security-solution\/\">new firmware<\/a> onto\u00a0<a href=\"https:\/\/x-phy.com\/products\/endpoint-security\/secure-ssd\/\" target=\"_blank\" rel=\"noopener\">X-PHY\u00ae<\/a>\u00a0to get access to the data from the laptop.\u00a0<\/p><p>The <a href=\"https:\/\/x-phy.com\/placing-ai-into-the-firmware-the-ultimate-layer-of-protection-and-efficiency\/\">real-time AI surveillance<\/a> detected the second boot loader and immediately triggered the Keycode Pro-X within the X-Factor Encryption feature. The file and pattern engine further verified the <a href=\"https:\/\/x-phy.com\/products\/endpoint-security\/secure-ssd\/xphyguard\/\">checksum and signature<\/a> for the new firmware. Although it is detected as a trusted host device, the verification failed because the signature and the unique serial number of the\u00a0<a href=\"https:\/\/x-phy.com\/\" target=\"_blank\" rel=\"noopener\">X-PHY\u00ae<\/a>\u00a0did not match.\u00a0<\/p><p>So, the boot loader was denied within a few seconds and a notification alert was sent to Kevin\u2019s smartphone via <a href=\"https:\/\/x-phy.com\/products\/enterprise\/server-defender\/technology\/\">pre-configured Bluetooth (BLE).<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2be48413 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2be48413\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2d9a043b\" data-id=\"2d9a043b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1b4c0347 elementor-widget elementor-widget-text-editor\" data-id=\"1b4c0347\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4><strong>X-PHY Protection Method<\/strong><\/h4><p>1. The AI real-time monitoring activates the Keycode Pro-X upon detecting the upload of new firmware onto the <a href=\"https:\/\/x-phy.com\/products\/endpoint-security\/secure-ssd\/\">X-PHY\u00ae.<\/a><\/p><p>2. File and pattern engine begin verification of checksum and signature of the uploading boot loader<\/p><p>3. The <a href=\"https:\/\/x-phy.com\/products\/enterprise\/server-defender\/usecase\/datacenters\/\">X-PHY\u00ae detects the source<\/a> of the update in a genuine host device.<\/p><p>4. Verification of checksum and signature fails as the firmware is not signed for the unique serial number on the X-PHY\u00ae.<\/p><p>5. Halts the uploading of a second boot loader and sends alerts to the user over BLE.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6c7b80ae elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6c7b80ae\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-48dd606a\" data-id=\"48dd606a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1de41a1f elementor-widget elementor-widget-image\" data-id=\"1de41a1f\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"506\" src=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/03\/Page_16.png\" class=\"attachment-large size-large wp-image-6275\" alt=\"\" srcset=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/03\/Page_16.png 857w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/03\/Page_16-300x190.png 300w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/03\/Page_16-768x486.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The major security concern for Public internet is the Wifi vulnerability to hacking. Rogue users can easily crack the wifi key to access and control the wifi router to redirect [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":6513,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[12],"tags":[],"class_list":["post-6512","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-use-cases"],"_links":{"self":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/posts\/6512","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/comments?post=6512"}],"version-history":[{"count":0,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/posts\/6512\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/media\/6513"}],"wp:attachment":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/media?parent=6512"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/categories?post=6512"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/tags?post=6512"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}