[cosc-grad-students-list] REMINDER: Presentation/Open Discussion with Mr. Lewis Heuermann

Eulenfeld, Menda menda.eulenfeld at tamucc.edu
Mon Nov 10 11:01:26 CST 2025


Title: Understanding the Threat: Wi-Fi Impersonation and the Human Layer of Cybersecurity
Synopsis:

In this teaching demonstration, I will guide the committee/students through an immersive and instructional exploration of wireless network trust by simulating a rogue access point (Evil Twin) scenario. Students are introduced to the mechanics and psychology behind Evil Twin attacks-where a malicious actor mimics a legitimate Wi-Fi network to intercept traffic or harvest sensitive credentials.

The lesson begins by unpacking how devices establish Wi-Fi connections and how trust is often granted implicitly. Using live, non-exploitative props like a Wi-Fi Pineapple and an ESP32 Marauder board, I'll demonstrate how an attacker can stage a fake login portal and leverage it as a social engineering tool, focusing on how login pages communicate assumptions, context, and intent to the user.

To bridge theory and practice, this lesson will incorporate learning frameworks that cybersecurity practitioners actively use in the field:
*         NICE Framework Work Roles: Cyber Defense Analyst, Vulnerability Analyst, and Security Awareness Trainer
*         MITRE ATT&CK Techniques: T1557 (Adversary-in-the-Middle), T1185 (Browser Session Hijacking)
*         Cyber Kill Chain: Emphasizing Reconnaissance, Weaponization, and Delivery stages, with analysis of attacker intent during each phase.

Throughout the session, I will model active learning techniques that promote learner agency-posing reflective prompts, inviting collaborative analysis, and guiding discussion through real-world analogies. The class will conclude with a "Spot the Trap" exercise using anonymized screenshots of suspicious login screens, allowing participants to apply what they've observed.

By the end of the demonstration, the committee will have experienced how I design lessons that deconstruct technical myths, build confidence through accessible tools, and develop cybersecurity reasoning that students can replicate independently.


Join Zoom Meeting
https://tamucc.zoom.us/j/92994933914?pwd=bF8jZFTXkbcB7KbFNQiHdTmeSeVHDd.1<https://nam12.safelinks.protection.outlook.com/?url=https%3A%2F%2Ftamucc.zoom.us%2Fj%2F92994933914%3Fpwd%3DbF8jZFTXkbcB7KbFNQiHdTmeSeVHDd.1&data=05%7C02%7Ccosc-grad-students-list%40listserv.tamucc.edu%7Cb68c0a0616c34b56396808de207ac8fe%7C34cbfaf167a64781a9ca514eb2550b66%7C0%7C0%7C638983908886533581%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=Z2IPE%2BvOrzzFOMB1P4DLMx3TjS19a4ZX%2F3Ft9R3B%2Brc%3D&reserved=0>

Meeting ID: 929 9493 3914
Passcode: 574973

---

One tap mobile
+13462487799,,92994933914#,,,,*574973# US (Houston)
+12532158782,,92994933914#,,,,*574973# US (Tacoma)

---

Join by SIP
∙ 92994933914 at zoomcrc.com<mailto:92994933914 at zoomcrc.com>
Passcode: 574973

Join instructions
https://tamucc.zoom.us/meetings/92994933914/invitations?signature=YlFPCS5pa8xqUmrggboZ4mlcQmuQZlAUdyp8x9Bt5DI<https://nam12.safelinks.protection.outlook.com/?url=https%3A%2F%2Ftamucc.zoom.us%2Fmeetings%2F92994933914%2Finvitations%3Fsignature%3DYlFPCS5pa8xqUmrggboZ4mlcQmuQZlAUdyp8x9Bt5DI&data=05%7C02%7Ccosc-grad-students-list%40listserv.tamucc.edu%7Cb68c0a0616c34b56396808de207ac8fe%7C34cbfaf167a64781a9ca514eb2550b66%7C0%7C0%7C638983908886557413%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=FcfR7bbIbBI92fCwIqKUkUIfcI6BmU0AwgoyrBe81ik%3D&reserved=0>


──────────

Title: Understanding the Threat: Wi-Fi Impersonation and the Human Layer of Cybersecurity
Synopsis:

In this teaching demonstration, I will guide the committee/students through an immersive and instructional exploration of wireless network trust by simulating a rogue access point (Evil Twin) scenario. Students are introduced to the mechanics and psychology behind Evil Twin attacks-where a malicious actor mimics a legitimate Wi-Fi network to intercept traffic or harvest sensitive credentials.

The lesson begins by unpacking how devices establish Wi-Fi connections and how trust is often granted implicitly. Using live, non-exploitative props like a Wi-Fi Pineapple and an ESP32 Marauder board, I'll demonstrate how an attacker can stage a fake login portal and leverage it as a social engineering tool, focusing on how login pages communicate assumptions, context, and intent to the user.

To bridge theory and practice, this lesson will incorporate learning frameworks that cybersecurity practitioners actively use in the field:
*         NICE Framework Work Roles: Cyber Defense Analyst, Vulnerability Analyst, and Security Awareness Trainer
*         MITRE ATT&CK Techniques: T1557 (Adversary-in-the-Middle), T1185 (Browser Session Hijacking)
*         Cyber Kill Chain: Emphasizing Reconnaissance, Weaponization, and Delivery stages, with analysis of attacker intent during each phase.

Throughout the session, I will model active learning techniques that promote learner agency-posing reflective prompts, inviting collaborative analysis, and guiding discussion through real-world analogies. The class will conclude with a "Spot the Trap" exercise using anonymized screenshots of suspicious login screens, allowing participants to apply what they've observed.

By the end of the demonstration, the committee will have experienced how I design lessons that deconstruct technical myths, build confidence through accessible tools, and develop cybersecurity reasoning that students can replicate independently.

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://listserv.tamucc.edu/pipermail/cosc-grad-students-list/attachments/20251110/af3f345a/attachment-0001.htm>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/calendar
Size: 11874 bytes
Desc: not available
URL: <http://listserv.tamucc.edu/pipermail/cosc-grad-students-list/attachments/20251110/af3f345a/attachment-0001.ics>


More information about the cosc-grad-students-list mailing list