Page 91 - Cyber Warnings
P. 91







Your next step would be – you would begin using such a network through your wireless LAN
capacities and as we can guess you would come at that event being fully supported with some
hacker’s tools.

For instance, you would have with your laptop some sort of network’s scanner being installed
and you would enable your remote administration tools.

Searching the network would require you to insert the certain range of the IP addresses being
present within that environment. So, how would you get familiar with such a range?

You can always see on the web what’s your IP address is and then try to define the range
including such a network. It’s well-known that the projector would have its own IP address being
somehow within the range with the rest of the devices belonging to that network.

Also, the majority of projectors would deal with their installation software and you would easily
recognize that device amongst the rest of the network’s gadgets. In other words, you would
nodoubtly get which one of the offered devices being represented with your IP scanner’s
window is the conference’s projector.

As we said – the hacker’s kit would usually deal with some of the remote administration tools, so
you would easily – using those options – be in position to switch off the projector or take a full
control over it.

This would happen so commonly at many events, so we would notice that the majority of
projectors are not protected with any sort of username and password access controls.

Also, it would be so easy to the experienced cyber geeks to connect to those devices and play
with them. It’s only one of the vulnerabilities we’ve noticed through our experience, so we would
highly recommend – having all of these in mind – that the stronger protection should get used
everywhere – not only with the projectors.


About The Author

Since Milica Djekic graduated at the Department of Control Engineering at
University of Belgrade, Serbia, she’s been an engineer with a passion for
cryptography, cyber security, and wireless systems. Milica is a researcher
from Subotica, Serbia. She also serves as a Reviewer at the Journal of
Computer Sciences and Applications and.

She writes for American and Asia-Pacific security magazines. She is a volunteer with the
American corner of Subotica as well as a lecturer with the local engineering society.



91 Cyber Warnings E-Magazine February 2017 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   86   87   88   89   90   91   92   93   94   95   96