Moving on to week 2 of the Making Future Communities at UNCC and so far it is slowly becoming more difficult. So far I already feel more accomplished than my previous project since I was successful using Virtual Box. I had to download Ubuntu so I was able to use Ettercap, which is a ARP spoofing program that allows Man In The Middle (MITM) attack strategies for hackers. No need to worry though, I am only using this for research purposes to prevent the attacks from happening. I have also been playing with another tool called WireShark, which can analyze network traffic of any type like HTTP, HTTPS, ESP and more. Using these tools have made me realize how vulnerable I am or anybody using an unsecured WiFi network in public. Besides play with the tools my instructor told me to download, I had to also read papers and watch YouTube videos about my topic, which was very interesting. The topic I am doing research on is something that is still fairly new and there are very few papers about which makes it very challenging. It still baffles me when I read the different types of ways hackers can interrupt phone calls while using WiFi calling services (calling people while using the WiFi instead of LTE). I will only list two that surprise me the most: the zombie call attack which will make the caller get stuck at the dial screen and not call the callee and the mute call attack which prevents the caller and the callee from hearing each other. There is a lot I have learned this week and there is still 7 or 8 weeks left so I can’t what will happen next.
