1.0.6 Class Activity - Top Hacker Shows Us How It Is Done
1.0.6 Class Activity - Top Hacker Shows Us How It Is Done
Objectives
Understand vulnerabilities of wireless and other common technologies
Part 1: View the TEDx Video “Top Hacker Shows Us How It’s Done; Pablos Holman at TEDxMidwests”
Part 2: Answer the following questions
Background / Scenario
Nearly every “secure” system that is used today can be vulnerable to some type of cyberattack.
Required Resources
PC or mobile device with internet access
Instructions
Part 1: View the TEDx Video “Top Hacker Shows Us How It’s Done; Pablos
Holman at TEDxMidwests”
a. Locate the video on the internet and watch it.
b. Choose one of the hacks discussed by Mr. Holman in the video and use your favorite search engine to
conduct some additional research on the hack.
c. For the hack chosen in Step 1b, answer the questions below. Be prepared to share your work in a full
class discussion.
b. What information, data, or control can be gained by a hacker exploiting this vulnerability?
Answer: The hacker himself has the access to people's credentials like passwords. He can use the
Bluetooth antenna attached to the fake gun to control people's Wi-Fi networks, giving him complete control.
Type your answers here.
2017 -2020Cisco and/or its affiliates. All rights reserved. Cisco Public Page 1 of 2 www.netacad.com
Class Activity - Top Hacker Shows Us How It is Done
2017 - 2020Cisco and/or its affiliates. All rights reserved. Cisco Public Page 2 of 2 www.netacad.com