Hi. In this unit we are going to talk about a how we could use technology today, Wi-Fi connections. You can find a Wi-Fi connection in almost everywhere today. You can find open and free Wi-Fi connections and you can choose this connection in order to have access to internet on your mobile phone your laptop or whatever. So it's fun and it's very useful. You can for example save batteries with your with your mobile phone, or you can save money or you can have a higher bandwidth and so it's very good solution, but, be careful because Wi-Fi connections also have risks involved. Of course, there are a lot of security protocols associated to Wi-Fi connections. You have to choose one. You can choose for example WEP, you can choose WPA, but most of them currently are obsolete. So try to choose WPA 3. But even having this protocol that is quite robust today, you have to take into account that unit a robust password, and of course you need to policy of updating your password according to your needs. >> Hi again. So Wi-Fi is a very very interesting and very powerful technology. But remember to verify which hotspot are you connecting to, it's quite important to verify this because of the fake access points. Okay, an attacker, your adversary can set a hotspot that is not the real one. It's a fake one, so whenever you want to connect to the Wi-Fi network in a coffee shop or whatever, you just choose one of the networks that are available and you connect to this network. And let's see it, if you see here which one is the right one, the first, or the second one? So you don't know because you have just the name of the network in front of you, and this is the evil one. So be very careful, whenever you connect to Wi-Fi networks in open spaces, like coffee shops or malls or wherever, because they may be a fake access point put there for a for you to connect to the adversary clouds. Okay, really really critical, the direct Wi-Fi attacks, most of the protocols as, you see also with the Ivan, when he commented about the WPA 3, are vulnerable to attacks. For example, WEP, WPA WPA2 they are quite easy to crack using hacking tools and these kind of things. So be very careful with the direct attacks, but it's very important to understand that the Wi-Fi access points are physical devices. So many times they are very, very, very complicated to upgrade. So there are no software updates or things where you can put to replace the venerable protocols. So many times the solution is to buy another one. So think about this, it is not very easy to solve security problems in Wi-Fi access points in these scenarios. Okay. And the last one even doing the right things even doing everything right, Wi-Fi are still vulnerable, because the password is weak, or someone is investing a lot of time hacking this specific device and these kind of things. So be careful with Wi-Fis because they are really interesting in terms of attacking. Another thing, there are plenty of hacking tools devoted to hack a Wi-Fi. There's one, Acrylic, it's from an Spanish company, Tarlogic, that develop a lot of the the interesting tools to crack and attack and identify and create heat maps of the Wi-Fi networks, but they are many for example, Wifislax, or Wifiway, or this kind of Linux distributions that are oriented to wi-fi hacking. And this is really interesting for the hacking kids that are learning new technologies and new ways of attacking, so be careful with Wi-Fis. Another thing very very very very important is what happens when your mobile phone or your mobile device wants to connect to a Wi-Fi network. Imagine, I take my mobile phone here, and I want to connect to a Wi-Fi network. Okay. What do you see in your screen? You see the list of the Wi-Fi networks you know you already connected in the past. And you see networks that are available in the region you are okay? What happens with your mobile device? The very first thing that this device is doing is asking to the radio spectrum for the Wi-Fis it already knows. If you have in the list Wi-Fi one and Wi-Fi two, your mobile device is asking to the radio spectrum about Wi-Fi one and Wi-Fi two. Let's see an example, for example with Ivan's mobile phone, these are the Wi-Fi networks that Ivan has available in this region and most of them are known to the device. So Ivan used to connect to this Wi-Fis. This is a very very very interesting thing about this, because he's connected to very secure Wi-Fi, AIT, okay, but the mobile device knows about these Wi-Fis. What happens if I build a fingerprint signature of the Wi-Fis related to Ivan's device, for example, as I know the device is asking for these networks, I created a specific signature. Okay. So do you think someone can be tracked using this idea of the signature? Yes, yes, absolutely, you can be tracked, because I can put several devices in Ivan's way from the subway to the office and in every single point of the map I'm tracking the Wi-Fis the device is asking about. So in this one here whenever Ivan get out of the subway, it will be near my device. So I will recognize the networks the device is asking, so I can say Ivan is here. And in the next one, the same, and in the next one the same. So I can track in a map every specific movement from Ivan that is going to the office from the subway. So this is a very dangerous thing the Wi-Fi tracking. But, I can go even further, okay, I can go beyond. What happens if two different persons have different networks? For example, Ivan in this way and Roman in this other way, we are both connected to the very secure Wi-Fi AIT, and if you see in the list, we have some networks that are exactly the same name. They are shared. So I can establish relationships among both devices, among the devices, they are in an area, just to confirm if you see the names Famous Hotel, Sexy Lovely Hotel, and Madrid Airport and in Roman's one, Famous Hotel, Sexy Lovely Hotel and Madrid Airport. I can confirm something that you already know for the course because you see our our behavior and you can confirm that we are in love. We are engaged because we are in the same hotels and we are traveling to the same airports. So this is very very very very very very important. You can not only track people and the movements they have, but you can link people that have some kind of a relationship or they are in the same places together. So this is a threat to the confidentiality and the privacy of people, be very careful with these kind of things, okay. >> Yeah, yeah. I know. I know we have the meeting of the organization. Yeah, I'm on my way. I just leave the subway. Okay. See you then. >> So you saw Ivan getting out of the subway going to the office? And remember we put the several of our devices tracking him. But even we can do more nasty things on Ivan. Imagine that I can have in one of my devices away for Ivan to connect to my Wi-Fi. Remember the fake access point technology that you can set up and make people connect, but Imagine, what if if I can make even connect automatically to my fake network? And remember as I know details about Wi-Fi networks Ivan knows and some of the configuration of these Wi-Fi networks, I can set up what is known as an Evil Twin. I can set up an fake access point that is an Evil Twin of an already known device or already known network that Ivan is usually connecting to, so in the moment even get out of the subway and start walking, going to the office, I put my device here and whenever its mobile device is near my attacking point, he will connect automatically to the Evil Twin. And then starts connecting to internet, showing passwords and whatever the device is doing in this moment. So this is another kind of attack that is very very critical in terms of Wi-Fi, be very careful. My suggestion, disable the Wi-Fi every time you are not using it, okay, very important. Not sure where to place my trap to catch Ivan, I have options but yeah for sure here. This is the perfect place. Hmm, fantastic. We will be there. >> So strange, I have connection with the Wi-Fi at my home. Yeah, who knows something ready with the internet? Okay, perfect. And now some conclusions about this unit. So first of all, Wi-Fi connections are awesome. It's a very useful tool that we can use and even it's in everywhere today. So it's amazing and we can use- I usually use a lot, it's an incredible to today, but you have to follow some recommendations. First of all, be careful with free and open hotspots. And very related with that when you arrive to a location, it's quite common that that location have a official Wi-Fi. So try to understand, try to figure out what is the name of the official Wi-Fi network of this location. Okay. If something looks suspicious, especially the strength, please use the common sense, common sense is your friend, for the whole life and also for cyber security. And if you need to use the Wi-Fi account, but you don't have it very clear, you can use services like VPN. Do you remember Roman told us about that? So it's a very interesting tool for cyber security for your own protection. And finally, please consider to disable your Wi-Fi in your cell phone, for example, your mobile phone or your laptop if you are not using it, because if you have it turn on maybe someone can try to connect to your computer or your cell phone. Okay. See you next unit.