In this section, we will discuss how we can leverage misconfiguration of network devices, in particular wireless access points. The following checklist can help with finding out misconfiguration issues on wireless access points:
Default user credentials on the device: An attacker has a better chance to gain access to the device if the default credentials on the device are not changed. Make sure the passwords set on the device are strong enough to keep an attacker at bay. A brute force attack is still an option for an attacker to crack into the device.
DNS settings on the device should reflect the authorized DNS IPs: Usually, attackers try to change the DNS of the device to point to their malicious DNS, thus MITM can be done without much hassle. If a user is trying to visit
https://bank.com
, the attacker can direct the user to attacker-https://bank.com
, which looks and feels the same. Thus, ensure the DNS is pointing to a legitimate DNS server. Malicious DNS IPs in...