CEH v9 Question of the Week: Same MAC Address

Paul has just finished setting up his wireless network and has enabled numerous security features such as changing the default SSID, enabling WPA encryption and enabling MAC filtering on his wireless router. Paul notices that when he uses his wireless connection, the speed is sometimes 54 Mbps and sometimes it is 24Mbps or less. Paul connects to his wireless router’s management utility and notices that a machine with an unfamiliar name is connected through his wireless connection. He checks the router’s logs and notices that the unfamiliar machine has the same MAC address as his laptop. What is Paul seeing here?

Read more

CEH v9 Question of the Week: Prevent Future DoS Attacks

Smith is an IT security consultant who has been hired on by an ISP that has recently been plagued by numerous DoS attacks. The ISP did not have the internal resources to prevent future attacks, so they hired Smith for his expertise. Smith looks through the company’s firewall logs and can see from the patterns that the attackers were using reflected DoS attacks. What measures can Smith take to help prevent future reflective DoS attacks against the ISP’s network?

Read more