<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Problematic students and malicious intents in Peer-Peer Topics</title>
    <link>https://www.googleforeducommunity.com/t5/Peer-Peer-Topics/Problematic-students-and-malicious-intents/m-p/148641#M4108</link>
    <description>&lt;P&gt;Yeah, back then I added a few addresses to make it harder to get the wifi info out of the device.&lt;/P&gt;</description>
    <pubDate>Wed, 07 May 2025 10:01:09 GMT</pubDate>
    <dc:creator>Kim_Nilsson</dc:creator>
    <dc:date>2025-05-07T10:01:09Z</dc:date>
    <item>
      <title>Problematic students and malicious intents</title>
      <link>https://www.googleforeducommunity.com/t5/Peer-Peer-Topics/Problematic-students-and-malicious-intents/m-p/130574#M3834</link>
      <description>&lt;P&gt;I am looking for suggestions as I'm sure basically every K12 administrator has their share of students who have malicious intents.&amp;nbsp; I found a user recently who has been trying to use Parrotsec, Kali, and Tails (that I'm aware of).&amp;nbsp; This student utilized proxmox from a Chromebook to a local IP that isn't ours (192.168.1.7:8006).&amp;nbsp; I'm assuming that this is a Pi or similar device that may be wired directly to the Chromebook as he apparently used it during school hours in a class discretely.&amp;nbsp; I'm not sure if his intent is to find a way around the internet filter, try to snoop for passwords, or some other means to compromise the network.&lt;/P&gt;&lt;P&gt;Are there certain settings in Google that I should be checking or changing to try and help prevent these situations?&amp;nbsp; There are students who do need access to the USB port for flash drives with images, so I can't just block all USB devices.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2025 20:18:32 GMT</pubDate>
      <guid>https://www.googleforeducommunity.com/t5/Peer-Peer-Topics/Problematic-students-and-malicious-intents/m-p/130574#M3834</guid>
      <dc:creator>dhalvorsen</dc:creator>
      <dc:date>2025-02-21T20:18:32Z</dc:date>
    </item>
    <item>
      <title>Re: Problematic students and malicious intents</title>
      <link>https://www.googleforeducommunity.com/t5/Peer-Peer-Topics/Problematic-students-and-malicious-intents/m-p/130613#M3835</link>
      <description>&lt;P&gt;What the heck is promox?&amp;nbsp; And for that matter,&amp;nbsp;Parrotsec, Kali, and Tails?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2025 20:24:28 GMT</pubDate>
      <guid>https://www.googleforeducommunity.com/t5/Peer-Peer-Topics/Problematic-students-and-malicious-intents/m-p/130613#M3835</guid>
      <dc:creator>ddelboccio</dc:creator>
      <dc:date>2025-02-21T20:24:28Z</dc:date>
    </item>
    <item>
      <title>Re: Problematic students and malicious intents</title>
      <link>https://www.googleforeducommunity.com/t5/Peer-Peer-Topics/Problematic-students-and-malicious-intents/m-p/130614#M3836</link>
      <description>&lt;P&gt;Not every problem has a technical solution. Send out a communication to all parents telling them that hacking into a network or defeating security measures is a federal crime and that both the families and, if of age, the students risk going to prison.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2025 20:26:51 GMT</pubDate>
      <guid>https://www.googleforeducommunity.com/t5/Peer-Peer-Topics/Problematic-students-and-malicious-intents/m-p/130614#M3836</guid>
      <dc:creator>MarkLoundy</dc:creator>
      <dc:date>2025-02-21T20:26:51Z</dc:date>
    </item>
    <item>
      <title>Re: Problematic students and malicious intents</title>
      <link>https://www.googleforeducommunity.com/t5/Peer-Peer-Topics/Problematic-students-and-malicious-intents/m-p/130617#M3837</link>
      <description>&lt;P&gt;That student, I would get to know them and help them figure out what they wanted. Sometimes the best tool is the student that wants to learn.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2025 20:51:27 GMT</pubDate>
      <guid>https://www.googleforeducommunity.com/t5/Peer-Peer-Topics/Problematic-students-and-malicious-intents/m-p/130617#M3837</guid>
      <dc:creator>9330cashmore</dc:creator>
      <dc:date>2025-02-21T20:51:27Z</dc:date>
    </item>
    <item>
      <title>Re: Problematic students and malicious intents</title>
      <link>https://www.googleforeducommunity.com/t5/Peer-Peer-Topics/Problematic-students-and-malicious-intents/m-p/130618#M3838</link>
      <description>&lt;P&gt;Story time: &amp;gt;25 years ago, one of our students found it rather, um, &lt;EM&gt;educational&lt;/EM&gt; to return to their dorm room after class to find a couple of FBI agents waiting for them there....as far as I know, there wasn't an arrest made, but the message was pretty clearly sent!&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2025 20:58:37 GMT</pubDate>
      <guid>https://www.googleforeducommunity.com/t5/Peer-Peer-Topics/Problematic-students-and-malicious-intents/m-p/130618#M3838</guid>
      <dc:creator>icrew</dc:creator>
      <dc:date>2025-02-21T20:58:37Z</dc:date>
    </item>
    <item>
      <title>Re: Problematic students and malicious intents</title>
      <link>https://www.googleforeducommunity.com/t5/Peer-Peer-Topics/Problematic-students-and-malicious-intents/m-p/131028#M3841</link>
      <description>&lt;P&gt;if they are using a device like a PI to bypass the network filters they must be connecting to the internet via your network. If they have access to the wifi they probably are using a VPN.&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can setup a ethernet connection for the Chromebooks ( see&amp;nbsp;&lt;A href="https://support.google.com/a/answer/2634553?hl=en&amp;amp;sjid=2568261543070865853-EU" target="_blank"&gt;https://support.google.com/a/answer/2634553?hl=en&amp;amp;sjid=2568261543070865853-EU&lt;/A&gt;&amp;nbsp;). Set the proxy to some non network ip eg ( 10.10.10.1 ) and a non standard port ( eg 9900&amp;nbsp; ). Set the DNS to&amp;nbsp;a network ip's that are NOT DNS server eg (&amp;nbsp; 192.168.1.1,&amp;nbsp;192.168.200,1 ). Have the proxy and DNS set to different networks.&lt;/P&gt;&lt;P&gt;This will make it a bit more difficult but not impossible to do what they are doing.&lt;/P&gt;</description>
      <pubDate>Mon, 24 Feb 2025 09:42:39 GMT</pubDate>
      <guid>https://www.googleforeducommunity.com/t5/Peer-Peer-Topics/Problematic-students-and-malicious-intents/m-p/131028#M3841</guid>
      <dc:creator>npl</dc:creator>
      <dc:date>2025-02-24T09:42:39Z</dc:date>
    </item>
    <item>
      <title>Re: Problematic students and malicious intents</title>
      <link>https://www.googleforeducommunity.com/t5/Peer-Peer-Topics/Problematic-students-and-malicious-intents/m-p/131032#M3842</link>
      <description>&lt;P&gt;The question is how is the pi connecting to your network, and is your network appropriately segmented to reduce risk in the event someone can do this exact thing?&amp;nbsp; We are doing penetration testing on our networks to help us keep all of these networks as secure as possible.&lt;/P&gt;&lt;P&gt;Is the student connecting through a USB or Bluetooth connection to your Chromebook, or is it directly connecting to your network?&lt;/P&gt;&lt;P&gt;1.&amp;nbsp; This is likely a clear violation of the AUP/Handbook and should be addressed.&lt;BR /&gt;2.&amp;nbsp; Once the means of connectivity is discovered, you can take action to prevent further access.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Without ANY research into this, I'd start looking into Android debugging protocol or sharing internet over USB.&amp;nbsp; Not sure off hand if the Chromebook can share internet through Bluetooth.&amp;nbsp; &amp;nbsp;I wonder if there are new methods now with USB-C that I am unaware of!&lt;/P&gt;&lt;P&gt;If the pi is connecting directly to the network, then you have some other work to do.&amp;nbsp; Were they Able to get the WPA key and how?&amp;nbsp; This used to be done through the network tools in Chrome://, not sure if you are blocking any of those setting pages.&lt;/P&gt;&lt;P&gt;IF this was my building, I would make sure the student understands the weight of the situation, but also recruit them.&amp;nbsp; If the kid is working with/for you, there is an opportunity for growth for the student and a way to further protect your district.&amp;nbsp; This also depends on the personality and intent of the student and would need to be weighed by administration, etc.&lt;/P&gt;</description>
      <pubDate>Mon, 24 Feb 2025 14:02:44 GMT</pubDate>
      <guid>https://www.googleforeducommunity.com/t5/Peer-Peer-Topics/Problematic-students-and-malicious-intents/m-p/131032#M3842</guid>
      <dc:creator>kaned</dc:creator>
      <dc:date>2025-02-24T14:02:44Z</dc:date>
    </item>
    <item>
      <title>Re: Problematic students and malicious intents</title>
      <link>https://www.googleforeducommunity.com/t5/Peer-Peer-Topics/Problematic-students-and-malicious-intents/m-p/131075#M3843</link>
      <description>&lt;P&gt;I am still fairly new to my role and have been ambitious to try and lock things down from how my predecessor ran things.&amp;nbsp; Sadly, I do not have the option of a NAC due to budget constraints.&amp;nbsp; The network that students connect to does not have internal access.&amp;nbsp; A lot, if not all, of the Chrome:// pages are blocked.&amp;nbsp; Administration is looking into this situation, but I'm not sure how many answers that will provide.&amp;nbsp; I don't foresee this student being one of those situations.&amp;nbsp; I look to this group for insight from other people who may be in similar situations, have far more knowledge in different areas, and I'm sure plenty of people in this group like to tinker who would have further insight yet.&amp;nbsp;&amp;nbsp;Thank you for giving me some things to look in to.&lt;/P&gt;</description>
      <pubDate>Mon, 24 Feb 2025 15:02:44 GMT</pubDate>
      <guid>https://www.googleforeducommunity.com/t5/Peer-Peer-Topics/Problematic-students-and-malicious-intents/m-p/131075#M3843</guid>
      <dc:creator>dhalvorsen</dc:creator>
      <dc:date>2025-02-24T15:02:44Z</dc:date>
    </item>
    <item>
      <title>Re: Problematic students and malicious intents</title>
      <link>https://www.googleforeducommunity.com/t5/Peer-Peer-Topics/Problematic-students-and-malicious-intents/m-p/131120#M3844</link>
      <description>&lt;P&gt;Feel free to respond back with any info.&amp;nbsp; It would be nice for the rest of us to be proactive about a similar situation!&lt;/P&gt;</description>
      <pubDate>Mon, 24 Feb 2025 17:25:25 GMT</pubDate>
      <guid>https://www.googleforeducommunity.com/t5/Peer-Peer-Topics/Problematic-students-and-malicious-intents/m-p/131120#M3844</guid>
      <dc:creator>kaned</dc:creator>
      <dc:date>2025-02-24T17:25:25Z</dc:date>
    </item>
    <item>
      <title>Re: Problematic students and malicious intents</title>
      <link>https://www.googleforeducommunity.com/t5/Peer-Peer-Topics/Problematic-students-and-malicious-intents/m-p/131126#M3845</link>
      <description>&lt;P&gt;Can you elaborate on those network tools under Chrome:// for chromebooks? Trying to look up/poke around to see if I can manage pulling the key on my districts devices and either I'm looking at the wrong topics or we've already toggled on whatever would prevent that. I know you used to be able to basically toggle show password in Windows that I think was finally (or at least the easy way) taken away. I know Android (and I think iPhone now?) has the share wifi QR code that basically has the password in plain text.&lt;/P&gt;</description>
      <pubDate>Mon, 24 Feb 2025 18:50:48 GMT</pubDate>
      <guid>https://www.googleforeducommunity.com/t5/Peer-Peer-Topics/Problematic-students-and-malicious-intents/m-p/131126#M3845</guid>
      <dc:creator>MattDPenn</dc:creator>
      <dc:date>2025-02-24T18:50:48Z</dc:date>
    </item>
    <item>
      <title>Re: Problematic students and malicious intents</title>
      <link>https://www.googleforeducommunity.com/t5/Peer-Peer-Topics/Problematic-students-and-malicious-intents/m-p/131418#M3848</link>
      <description>&lt;P&gt;This was a conversation on the previous platform (now unavailable), so I cannot reference conversations/issues.&amp;nbsp; The WPA key was shown in plain text in the Chrome://policy and Chrome://network.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;"WiFi": { "AutoConnect": true, "HiddenSSID": false, "Passphrase": "********", "SSID": "MySSID", "Security": "WPA-PSK" }&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Google fixed those and then it was available in the downloadable network logs for a short period.&lt;/P&gt;&lt;P&gt;This was all at least 12+ months ago, posibly 24+ months ago.&lt;/P&gt;&lt;P&gt;It seems like for a good year, we kept seeing the WPA key popping up in several Chrome:// pages for students.&amp;nbsp;&amp;nbsp;We have resorted to blocking Chrome://* and specifically allowing certain pages as needed.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;To be clear&lt;/STRONG&gt;, I do not know of any current ways to do this, but we've blocked almost all of Chrome:// so I'm not in there tinkering much anymore.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2025 13:56:16 GMT</pubDate>
      <guid>https://www.googleforeducommunity.com/t5/Peer-Peer-Topics/Problematic-students-and-malicious-intents/m-p/131418#M3848</guid>
      <dc:creator>kaned</dc:creator>
      <dc:date>2025-02-25T13:56:16Z</dc:date>
    </item>
    <item>
      <title>Re: Problematic students and malicious intents</title>
      <link>https://www.googleforeducommunity.com/t5/Peer-Peer-Topics/Problematic-students-and-malicious-intents/m-p/148641#M4108</link>
      <description>&lt;P&gt;Yeah, back then I added a few addresses to make it harder to get the wifi info out of the device.&lt;/P&gt;</description>
      <pubDate>Wed, 07 May 2025 10:01:09 GMT</pubDate>
      <guid>https://www.googleforeducommunity.com/t5/Peer-Peer-Topics/Problematic-students-and-malicious-intents/m-p/148641#M4108</guid>
      <dc:creator>Kim_Nilsson</dc:creator>
      <dc:date>2025-05-07T10:01:09Z</dc:date>
    </item>
  </channel>
</rss>

