WATCH - Kevin Mitnick demonstrates how easy it is for a hacker read your email messages

Kevin Mitnick demonstrates how easy it is for a hacker to tap into your network and read your email messages, even if it’s a fiber optic network.

Kevin Mitnick, famous former black hat hacker, demonstrates just how easy it is for a hacker to tap into your network and read your email. And he’s doing it with a fiber optic network connection, not a simple and very non-secure CAT5x or CAT6x network wire. And he doesn’t have to connect to the Internet, your network, or any outside resources to do this. He clamps onto a fiber optic “wire”, opens Wireshark, and sniffs away your most guarded secrets.

Mitnick demonstrates in under five minutes how he could get near your network, set up a clandestine connection, sniff your network, grab your passwords, email, anything sent “over the wire” unencrypted, and disappear within minutes. And you’d never catch him doing it.

View Demonstration: https://youtu.be/KcJWXpABpVo

Source: macblue's blog

Topics: Speaking Engagements, fiber optic network, fiber optic network connection, penetration testing, tap into network, Wireshark, CAT6x wire, grab passwords, over the wiere unencrypted, security awareness training, security consultant, malware, clandestine connection, non-secure CAT5x wire, phishing, ransomware, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

The Growth of Third-Party Software Supply Chain Cyber Attacks

When testing your employees' social engineering readiness, your teams need simulated attacks that feel as if they’re coming from a nefarious engineer...

Read more ›

Bypassing Key Card Access: Shoring Up Your Physical Security

As you build additional layers of defense into your cybersecurity framework, it's important to implement physical security strategies as well.

Read more ›

How to Prioritize Your Pentesting Report’s Remediation Recommendations

If you recently received a penetration test, you’re on the right track to improving your cybersecurity posture. However, you may be wondering what the..

Read more ›
tech-texture-bg