WATCH - Kevin Mitnick demonstrates how easy it is for a hacker read your email messages

Kevin Mitnick demonstrates how easy it is for a hacker to tap into your network and read your email messages, even if it’s a fiber optic network.

Kevin Mitnick, famous former black hat hacker, demonstrates just how easy it is for a hacker to tap into your network and read your email. And he’s doing it with a fiber optic network connection, not a simple and very non-secure CAT5x or CAT6x network wire. And he doesn’t have to connect to the Internet, your network, or any outside resources to do this. He clamps onto a fiber optic “wire”, opens Wireshark, and sniffs away your most guarded secrets.

Mitnick demonstrates in under five minutes how he could get near your network, set up a clandestine connection, sniff your network, grab your passwords, email, anything sent “over the wire” unencrypted, and disappear within minutes. And you’d never catch him doing it.

View Demonstration: https://youtu.be/KcJWXpABpVo

Source: macblue's blog

Topics: fiber optic network, fiber optic network connection, penetration testing, tap into network, Wireshark, CAT6x wire, grab passwords, Hacker, keynote speaker, over the wiere unencrypted, security awareness training, security consultant, malware, clandestine connection, non-secure CAT5x wire, phishing, ransomware, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

PCI Testing: Everything You Need To Know

Penetration testing is crucial for businesses to help ensure that their security posture will stand against threat actors. For businesses that handle ..

Read more ›

The 4 Phases of Penetration Testing

So, you’ve done your research on penetration testing and are ready for the pentest engagement. But before you choose just any pentesting vendor, it’s ..

Read more ›

What is Web Application Penetration Testing?

Is your company in the process of developing a new application? There are a lot of moving parts involved in developing and deploying cutting-edge appl..

Read more ›
tech-texture-bg