1.0.6 Class Activity – Top Hacker Shows Us How It is Done
Objectives
Understand vulnerabilities of wireless and other common technologies
Part 1: View the TEDx Video “Top Hacker Shows Us How It’s Done; Pablos Holman at TEDxMidwests”
Part 1a: Pegasus: the spyware technology that threatens democracy
• Pegasus: the spyware technology that threatens democracy
• https://www.youtube.com/watch?v=G7H9uo3j5FQ&t=9s
• Jul 19, 2021
Part 2: Answer the following questions
Background / Scenario
Nearly every “secure” system that is used today can be vulnerable to some type of cyberattack.
Required Resources
• PC or mobile device with internet access
Instructions
Part 1: View the TEDx Video “Top Hacker Shows Us How It’s Done; Pablos Holman at TEDxMidwests”
a. Locate the video on the internet and watch it.
b. Choose one of the hacks discussed by Mr. Holman in the video and use your favorite search engine to conduct some additional research on the hack.
c. For the hack chosen in Step 1b, answer the questions below. Be prepared to share your work in a full class discussion.
Part 2: Answer the following questions.
Questions:
a. What is the vulnerability being exploited? The cell phone
b. What information, data, or control can be gained by a hacker exploiting this vulnerability? It can bypass your voice security with just a single text, and it gets complete access to your device.
c. How is the hack performed? With just a single text
d. What about this particular hack interested you specifically? You will not know that this is happening to you
e. How do you think this particular hack could be mitigated? No one knows how to stop the hack because the authors of this application are getting more advanced.
cisco academie