With the ease of accessing the internet via wireless, many laptop users are always looking for or take advantage of hotspots available to always be active. There are simply open the email, there are just in it for browsing, in fact, there is also to send the office duties. The pemilk and hotspot users do not realize that perhaps, among them some harm. For simple cases, a false public hotspot can trap the users to provide their username and password without them knowing that they have given it.in this article, I will explain some of the tricks used by some people who intend in using wireless ugly. To prevent problems, can be seen in another article in this website that provides solutions and prevention.
To make wireless hacking, the first step taken is to find a wireless network that is closest to you. This can be done with Wardrive (if done outside the room) or around hotspots around the existing (if indoors). In this article, the author tries to describe how to use Wardrive because it is safer and remember we are just trying to figure out which wireless networks are weak.
Wardrive
Wardrive is an electronic fishing expedition to find a weak wireless networks around you. Most, most of these wireless networks are not even given a password or encryption to protect it.
This activity is performed to look for any network that will be the object of attack.Thus, we can carry out attacks against wireless networks that we have to target. To do the activity of this simple equipment needed to start it.
This activity is performed to look for any network that will be the object of attack.Thus, we can carry out attacks against wireless networks that we have to target. To do the activity of this simple equipment needed to start it.
List of equipment needed:
• GPS receiver
if your area already have a GPS, you can easily mark any areas that you explore and give a special mark in the areas where you already are exploring such a weak wireless network.
• GPS receiver
if your area already have a GPS, you can easily mark any areas that you explore and give a special mark in the areas where you already are exploring such a weak wireless network.
• Wireless PCMI card
equipment is required to extend your wireless network. Typically, this equipment is equipped with a jack for wireless receiver antenna or cellular network support for a wider network.
equipment is required to extend your wireless network. Typically, this equipment is equipped with a jack for wireless receiver antenna or cellular network support for a wider network.
• Wireless antenna receiver
equipment is required to add wireless coverage PCMI card that you have to connect the jack he had into the wireless card. If the wireless card you have do not have the jack, you can buy a wireless antenna that uses a usb port that has many in the market. But, if you are not satisfied with the ability to obtain the network using equipment you have, you can membikinnya cheaply by following the instructions on the website below: http://www.instructables.com/id/EQARE4I72GEPUCHTHU/
equipment is required to add wireless coverage PCMI card that you have to connect the jack he had into the wireless card. If the wireless card you have do not have the jack, you can buy a wireless antenna that uses a usb port that has many in the market. But, if you are not satisfied with the ability to obtain the network using equipment you have, you can membikinnya cheaply by following the instructions on the website below: http://www.instructables.com/id/EQARE4I72GEPUCHTHU/
Search Wireless Network
Most wireless networks that supply does not have security or encryption to protect it.To track it down, it takes the equipment supports. There are two tools that are commonly used for this purpose.
• Network Stumbler or better known as NetStumbler
windows based software is very easy to find wireless signals emitted from the hotspot to the user. Meet the author of many wireless users use this software to find the right location to get a wireless signal from a strong hotspot or hotspot in the area surveyed is good enough or not.
windows based software is very easy to find wireless signals emitted from the hotspot to the user. Meet the author of many wireless users use this software to find the right location to get a wireless signal from a strong hotspot or hotspot in the area surveyed is good enough or not.
• Kismet
One of the functions that are missing from NetStumbler is the ability to display the SSID of the hotspot. on the access point, they are routinely broadcasting this info always. cuman, it mostly contains the SSID info unreadable or encrypted. This program will find and display the SSID is not broadcast by the hotspot and it is very important to search for wireless networks to be tested.
One of the functions that are missing from NetStumbler is the ability to display the SSID of the hotspot. on the access point, they are routinely broadcasting this info always. cuman, it mostly contains the SSID info unreadable or encrypted. This program will find and display the SSID is not broadcast by the hotspot and it is very important to search for wireless networks to be tested.
Entering the wireless network that has been found
After finding a line network, the next step is to try to connect to a network. If the network does not use security encryption, you can directly access to the SSID. If the SSID is not broadcast, you can enter the SSID is not broadcast. Of course, you can easily find that is not broadcast using the existing features of kismet is not it? If the network is encrypted, you need one of the tools below.
• CoWPAtty
This software uses the brute force method to open a WPA-PSK, PSK which itself is considered as a new WEP wireless security security unrtuk in this rumah.Progam try some of the various options from the dictionary file if anyone is in accordance with what is used as key
This software uses the brute force method to open a WPA-PSK, PSK which itself is considered as a new WEP wireless security security unrtuk in this rumah.Progam try some of the various options from the dictionary file if anyone is in accordance with what is used as key
• ASLeap
if any network using LEAP, this tool can be used to find such a username and password data that are online on the network, and access override pemiliknya.LEAP not protect the process such as EAP, which was a major weakness for the LEAP.
if any network using LEAP, this tool can be used to find such a username and password data that are online on the network, and access override pemiliknya.LEAP not protect the process such as EAP, which was a major weakness for the LEAP.
Wireless data sniffing or steal
No matter whether you are connected directly to a wireless network or not, if there are wireless networks in the area near you, there is always the data that passes through the network whenever it is. To retrieve data, you need the equipment to retrieve or view data.
• Wireshark (Ethereal predecessor)
where there is still debate how ynag quickest in responding to this program, there is no doubt that this software is very useful. he can look for an existing wireless network complete with security info. This software can loot the data from the 802.11 hotspot management and can also be used as a tool to look for hotspots that do not protect themselves with the SSID.
where there is still debate how ynag quickest in responding to this program, there is no doubt that this software is very useful. he can look for an existing wireless network complete with security info. This software can loot the data from the 802.11 hotspot management and can also be used as a tool to look for hotspots that do not protect themselves with the SSID.
• SwitchSniffer
This software is a program that can search for the active user in the LAN switch network and can take a whole packet of data without the consent of the user is concerned, this software can also detect the program is running and membokir arpspoofer sessions like firewall defenses. if you combine this program with another sniffer program, you can view and retrieve user id and passwords of other users in your network.
This software is a program that can search for the active user in the LAN switch network and can take a whole packet of data without the consent of the user is concerned, this software can also detect the program is running and membokir arpspoofer sessions like firewall defenses. if you combine this program with another sniffer program, you can view and retrieve user id and passwords of other users in your network.
Your next action?
Once you know how the process of hacking, it's up to you what to do with data or hotspots that you have found and you exploit it. if you want to report to admin hotspots that there are weaknesses, you have become part of the Ethical hackers.but, if you even further exploit these hotspots, then you become Blackcap Hacker.you would choose to be, it is your right. I only share info only. I hope this tutorial is useful for you.
Sources:
- Hack proofing your network
- hacking wireless networks for dummies
- http://www.ethicalhacker.net/content/view/16/24/
- Hack proofing your network
- hacking wireless networks for dummies
- http://www.ethicalhacker.net/content/view/16/24/
No comments:
Post a Comment