{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

How to Hack Wireless Internet Connections

How to Hack Wireless Internet Connections - How to Hack...

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: How to Hack Wireless Internet Connections in 3 Easy Steps Connections Presented By By Joshua Johnson Joshua How to Hack Wireless Internet Connections Connections This This presentation is intended to inform the audience about methods used to “hack” wireless internet connections, not for any malicious use but strictly for educational purposes and personal intentions such as recovering a misplaced network key for the users own wireless connection. Wireless Internet Wireless The The term “wireless internet” is perfectly self-explanatory. It is internet access without the use of wires. Instead it uses radio frequency bands to exchange information between your computer and the Internet. the Wireless access allows users to connect to the internet from any location within range of a wireless access point. range Wireless Internet Equipment Wireless For home use, the basic equipment is: Wireless NIC card Wireless router or access point Internet access Internet Advantages Advantages No wires Mobility Faster speeds Widely available equipment Convenience Inexpensive to set-up Disadvantages Disadvantages Limited range Interference with other wireless access Interference points points Encryption can be broken even at its Encryption strongest strongest Hacking Wireless Internet Hacking Wireless Wireless networks are very common. It is also very common to find wireless networks that are unsecured. Maybe the users are lazy or maybe they are not savvy when it comes wireless networks. Whatever the reason, hackers have found wireless networks relatively easy to break into, and even use wireless technology to crack into non-wireless networks. Wireless Encryption Wireless The The main source of vulnerability associated with wireless networks are the methods of encryption. There are a few different type of wireless encryption including: including: WEP WEP Stands for Wired Equivalent Privacy. Breakable even when configured correctly Can be broken in as little as 3 minutes WPA or WPA2 WPA Stands for Wi-Fi Protected Access Created to provide stronger security Still able to be cracked if a short password is Still used. If a long passphrase or password is used, these If protocol are virtually uncrackable. protocol Even with good passwords or phrases, unless Even you really know what your doing, wireless networks can be hacked and here’s how……. networks A little info… little When When a user uses wireless internet they generate what are called data “packets”. Packets are transmitted between the Packets wireless NIC card and the wireless access point via radio waves whenever the computer is connected with the access point. More info… More Depending Depending on how long the computer is connected, it can generate a certain number of packets per day. The more users that are connected to one The access point, the more packets are generated. First… First… You must locate the wireless signal This can be done by using your default This Windows tool “View Available Wireless Network” Network” More useful tools include NetStumbler and More Kismet. Kismet has an advantage over the other because it can pick up wireless signals that are not broadcasting their SSID. SSID. Second… Second… Once Once you located a wireless network you can connect to it unless it is using authentication or encryption. If it is using authentication or encryption If then the next step would be to use AirSnort, a tool for sniffing out and cracking WEP keys. AirSnort AirSnort AirSnort AirSnort must gather about 5 to 10 million packets before it can even begin to crack a wireless key. wireless This could take anywhere between a few This minutes to a few weeks depending on how many packets are being generated. If a small number of people are using the network then it will most likely take weeks. Third… Third… Once Once AirSnort has recovered enough packets it will then go to work on reading the captured information gathered from the packets and crack the key giving you access. Other tools such as CowPatty can use Other dictionary files to crack hard WPA keys. dictionary Prevent Your Network from Getting Hacked Hacked Don’t Don’t broadcast your SSID . This is usually done during the setup of your wireless router. done Change the default router login to something Change else. If your equipment supports it, use WPA or WPA If 2 because it offers better encryption which is still able to be broken but much harder. able Always check for updates to your router. Turn off your router or access point when not Turn using it. Prevent Your Network from Getting Hacked Hacked There There is no such thing as 100% percent security when using wireless networks but at least with these few simple steps you can make it harder for the average person to break into your network. THE END THE ...
View Full Document

{[ snackBarMessage ]}