IT Support for New Brunswick Small and Mid-sized Businesses

NetAdmins provides enterprise-class IT services & tech support to New Brunswick, Nova Scotia and PEI small and mid-sized businesses. We manage every part of your IT, so you can focus on what you do best—running your business.

Partnering with NetAdmins is like having an entire IT support department at your disposal, whenever you need it. With a range of services including IP telephony (VoIP), email and web hosting, data back ups, paperless document management, security audits and 24-hour IT helpdesk, New Brunswick businesses can count on us as their only stop for business IT solutions.

On top of our à la carte offerings, we also provide comprehensive Managed IT Services in New Brunswick, Nova Scotia & PEI—including unlimited onsite and remote IT support, so you have a constant hedge against IT disasters. Our skilled computer technicians in New Brunswick maintain your business IT systems, keeping them in top shape, and minimizing downtime.

We make sure your managed IT services in New Brunswick are stronger and more secure so your users can be more productive and focused on your core business—always at a savings to your bottom line.

Contact us today to learn more about our Managed IT Service plans or our range of expert IT and communication services.

What is Fluxion?

Fluxion is a new program that combines social engineering and technology to trick users into giving up their log-in and password information. This program is a step above Wifiphisher, which lacks the ability to verify WPA passwords. Fluxion takes all the work out of hacking using a variety of processes that quickly and easily convince users to provide their Wi-Fi password.

Hackers can acquire these passwords through a few simple taps on a keyboard. Fluxion is regarded as a success in making it easier than ever for cyber thieves to steal valuable information from users.

Fundamentally, or in terms of many aspects of its basic framework, it is similar to previous developments but uses a twin access point in combination with handshake capture and integrated jamming functions. These can work together so that aspects of hardware and software operations that normally take place in the standard functionality of the user account are overwhelmed.

What Recent Developments And Potentials Should I Be Concerned With?

The extent that Fluxion has developed in combination with its accessibility and ease of use online is the most concerning. A search of Google or other major internet search engines will reveal numerous instructional pages that can be downloaded. These instructions provide anyone with a little Internet skill to begin a new career as a cyber thief. These sites provide public access to a range of resources that make it possible for anyone to violate user privacy and accounts and steal login information.

The program initiated as an improvement over a successful attack and was rewritten, so both the structure and coding have been strategically optimized in addition to its user-friendliness and availability.

How Does Fluxion Work?

Fluxion uses what is known as a WPA handshake to affect the functionality of a login page as it attempts to gain receipt of user information. It can affect how the user’s entire script is controlled as the original network is jammed, and a clone is created with the same name, attempting to persuade the user into making an unsafe connection under the guise of a familiar one. It often requests that the user allow time for their router or firmware to reload or be updated. This is just a ploy; the real objective is to steal sensitive information.

Fluxion is an EvilAP attack tool, written with a combination of Bash and Python, that is used for MiTM attacks on WPA Wireless networks. Online sources report on Fluxion as a potentially beneficial tool while touting its features similar to how potential improvements in business functions could be experienced through software installation. Hack Insight claims that the use of Fluxion allows network scanning, handshake capture, web interface use, imitating original access points, the de-authentication of all users on a network, capturing and redirecting of all DNS requests, captive portal launching, password verification processes, and automatic program termination following the recording of a viable password. Technology and strategies applied include the launching of FakeAP instances for access point emulation, fake DNS server launching, and MDK3 process spawning.

Social Engineering

What’s Been Happening In Research And Development?

Research and development (R&D) regarding Fluxion and related computer software security processes have involved multiple studies and patents in the past year. At the 12th International Conference on Recent Innovations in Science, Engineering, and Management, researchers reported having developed a highly successful cracking system by using Fluxion as their foundation. They explained that the damage that can be done with new hacking software using Fluxion demands better software processes in addition to network strategies in currently maintained and improving systems, particularly those that handle network connections and passwords.

At the 2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI), researchers reported that a number of new security patents have been involved in safeguarding against new hacking techniques that are relevant to the processes used by Fluxion. Fluxion was projected to remain a target of ethical hackers in ongoing research and development, and a foundation of the more damaging tools developed and made accessible online.

What’s The Bottom Line?

  • Accessibility and ease of use make Fluxion particularly dangerous
  • Combines multiple processes for high potential effectiveness
  • Foundation of new and more deadly cyber security attacks
  • Warrants multiple security upgrades and ongoing R&D

Comments are closed.