News

Published on June 24th, 2015 📆 | 5477 Views ⚑

0

Kevin Mitnick explains how to hack fiber optic and steal sensitive data


iSpeech.org

The popular hacker Kevin Mitnick explains how it is easy to steal data from a network tapping the cable, even if itā€™s a fiber optic network.

Kevin Mitnick demonstrates how easy it is for a hacker to tap into your network and read your email messages, even if itā€™s a fiber optic network.

Kevin Mitnick is the father of the art of hacking, hacking is a philosophy of life and today the MasterĀ demonstrates how easy it is for an attacker to tap into a network to steal sensitive data, access emails, even if itā€™s a fiber optic network.

[adsense size='1']

Kevin Mitnick clamped onto a fiber optic cable, CAT5x or CAT6x network wire, and by using the popular network analyzer Wireshark demonstrated how is simple to sniff any unencrypted information is a few minutes without leaving any trace. Mitnick used in his attack anĀ optic fiber clip-on couplerĀ that provides non-invasive bi-directional coupling into 250 micron coated single-mode fibers.

ā€œThe FOD 5503 offers the ability to couple fiber optic talk sets at any intermediate point along a fiber span where access to a terminated end is not available.ā€ states the description of theĀ optic fiber clip-on coupler.

Such kind of hardware is not used to hack into fiber, but it is designed for maintenance purpose and fiber identification.





Kevin MitnickĀ published a videoĀ to demonstrate the attack, it shows the popular hacker while is sniffing an email directly from the tapped cable.

The hackers can easily tap without cutting the wire by using alligator clips to attach to the cable or they can cut the cable and plug both ends into a small hub to intercept the traffic.

[adsense size='1']

In both cases, it is essential to prevent physical access to the wire, but most important is to useĀ encrypted connections,Ā while accessing any kind of web services, including email, chat, web browsing.

An attack like the one presented by Kevin Mitnick is very easy to arrange, clever attackers could use a cheap and tinyĀ Raspberry PiĀ hide the tap used to grab the data. A similar scenario is scaring because an attacker can exfiltrate data from the targeted network for a long period without arousing suspicions.

Let me suggest toĀ watch the video.

Tagged with: ā€¢ ā€¢ ā€¢ ā€¢ ā€¢



Comments are closed.