100% found this document useful (1 vote)
3K views2 pages

1.0.6 Class Activity - Top Hacker Shows Us How It Is Done

The document describes a class activity where students watch a TED talk by Pablo Holman titled "Top Hacker Shows Us How It's Done". In the talk, Holman discusses different hacks, and students are asked to research one in more detail. One hack discussed uses a Bluetooth antenna attached to a fake gun to steal passwords from people's devices within a kilometer. By exploiting vulnerabilities in wireless technologies, the hacker can gain control of people's Wi-Fi networks and access their credentials. Students are asked questions about the vulnerability, what access a hacker could gain, how the hack is performed, what specifically interested them about this hack, and how it could be mitigated.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
3K views2 pages

1.0.6 Class Activity - Top Hacker Shows Us How It Is Done

The document describes a class activity where students watch a TED talk by Pablo Holman titled "Top Hacker Shows Us How It's Done". In the talk, Holman discusses different hacks, and students are asked to research one in more detail. One hack discussed uses a Bluetooth antenna attached to a fake gun to steal passwords from people's devices within a kilometer. By exploiting vulnerabilities in wireless technologies, the hacker can gain control of people's Wi-Fi networks and access their credentials. Students are asked questions about the vulnerability, what access a hacker could gain, how the hack is performed, what specifically interested them about this hack, and how it could be mitigated.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Class Activity - Top Hacker Shows Us How It is Done

Objectives
Understand vulnerabilities of wireless and other common technologies
Part 1: View the TEDx Video “Top Hacker Shows Us How It’s Done; Pablos Holman at TEDxMidwests”
Part 2: Answer the following questions

Background / Scenario
Nearly every “secure” system that is used today can be vulnerable to some type of cyberattack.

Required Resources
 PC or mobile device with internet access

Instructions

Part 1: View the TEDx Video “Top Hacker Shows Us How It’s Done; Pablos
Holman at TEDxMidwests”
a. Locate the video on the internet and watch it.
b. Choose one of the hacks discussed by Mr. Holman in the video and use your favorite search engine to
conduct some additional research on the hack.
c. For the hack chosen in Step 1b, answer the questions below. Be prepared to share your work in a full
class discussion.

Part 2: Answer the following questions.


Questions:

a. What is the vulnerability being exploited?


Answer: Password is being stolen from a distant location.

b. What information, data, or control can be gained by a hacker exploiting this vulnerability?
Answer: The hacker himself has the access to people's credentials like passwords. He can use the
Bluetooth antenna attached to the fake gun to control people's Wi-Fi networks, giving him complete control.
Type your answers here.

c. How is the hack performed?


Answer: The attack was carried out with the aid of a long-range password sniffing program. It can monitor
your Wi-Fi network from a kilometer away. Any device linked to that network may be used to collect
passwords using this program.

2017 -2020Cisco and/or its affiliates. All rights reserved. Cisco Public Page 1 of 2 www.netacad.com
Class Activity - Top Hacker Shows Us How It is Done

d. What about this particular hack interested you specifically?


Answer: This specific malware draws my attention since it has a series of innovative tools for stealing
credentials by targeting people's Wi-Fi.

e. How do you think this particular hack could be mitigated?


Answer: By using short-range targets within a 2kilometer radius, this hack may be made less destructive.
It has a lower chance of obtaining access to towns and cities.

2017 - 2020Cisco and/or its affiliates. All rights reserved. Cisco Public Page 2 of 2 www.netacad.com

You might also like