
With the ease of accessing the internet via wireless, many laptop users are always looking for or use the hotspot is always active. There is simply open the email, there is a cuman just browsing, even, there is also a duty to send the office. The owner and hotspot users may not realize that, among those who intend no evil. For simple cases, a false public hotspot can trap the users to provide their username and password without them realize that they gave it. in this article, I will describe some of the tricks used by some people who intend in using wireless ugly. To prevent problems, can be seen in another article in this website is to provide solutions and prevent.
To make wireless hacking, the first step is the search for the nearest wireless network with you. This can be done with wardrive (if done outside the room) or wander around the hotspot (if in the room). In this article, the author tried to decipher how to use the more secure because wardrive and remember we are only trying to find out which wireless networks are weak.
Wardrive
Wardrive electronic fishing expedition is to search for the weak wireless networks around you. Most people, most of the wireless network is not even given a password or encryption to protect it.
This activity is carried out to find the network which will be the object of attacks. So, we can make attacks against wireless networks that have made us a target. To do this, simple equipment needed to get started.
List of equipment needed:
• GPS receiver
if you already have the GPS, you can easily mark any areas that you explore and mark out specific areas in which you are browsing is there a wireless network is weak.
• Wireless PCMI card
Equipment is needed to extend your wireless network. Typically, this equipment is equipped with a jack for wireless receiver antenna or supporting provider network to obtain a wider network.
• Wireless antenna receiver
Equipment is needed to increase the coverage of PCMI wireless card that you have to connect them to the jack in your wireless card. If the wireless card you have does not have a jack, you can buy a wireless antenna using a usb port that has been circulating in the market. But, if you are not satisfied with the ability to obtain the network using equipment you have, you can membikinnya with cheap by following the instructions on the website below:
http://www.instructables.com/id/EQARE4I72GEPUCHTHU/
Search Wireless Network
Most wireless networks that do not have any outstanding security or encryption that protect it. For tracking, the equipment required to support. There are two tools that are usually used for this purpose.
• Network Stumbler better known NetStumbler
Windows-based software is very easy to find the wireless signal that emanated from the hotspot to the user. The author saw many wireless users use this software to find the right location to get the signal from the wireless hotspot or a strong mensurvei whether hotspot in the area is good or not.
• Kismet
One of the functions that are missing from NetStumbler is the ability to display the SSID of the hotspot. on the access point, they were every broadcast this info, contains most of the info SSID that is not legible, or encrypted. This program will find and display the SSID is not broadcast by the hotspot and it is very important to search for wireless networks that will be tested.
Entering the wireless networks that have been found
Find a network after the network, the next step is to try to connect to your network. If the network does not use security encryption, you can directly access to the SSID. If the SSID is not broadcast, you can enter the SSID that is not in the broadcast. Of course, you can easily find that the broadcast does not use features that have not kismet? If the network is encrypted, you need one of the tools below.
• CowPatty
This method uses brute force to open the WPA-PSK, PSK, which itself is considered a new unrtuk WEP security on wireless security rumah.Progam try some of these various options comes from the dictionary file if anyone is in accordance with what is used as key
• ASLeap
if there is a network that uses Leap, this tool can be used to search for data such as username and password that are online in the network, and access override the owner.LEAP not protect the process, such as EAP, which is a major weakness for the Leap.
steal Wireless Data
No matter whether you are connected directly to the wireless network or not, if there is a wireless network in the area near you, always have the data through the network at any time in it. To retrieve data, you need to retrieve the equipment or see the data.
• Wireshark (Ethereal predecessor)
where there is still debate on how to ynag the fastest in this program, there is no doubt that this software is very useful. he can find a wireless network with no security info. this software can mecuri data from the 802.11 hotspot management and can also be used as a tool to search for a hotspot does not protect himself with the SSID.
• SwitchSniffer
This software is a program that can search for the active user in the LAN switch network and can take a whole packet of data without the consent of the user, this software can also detect the program running and arpspoofer session membokir such defense firewal. if you combine this program with a sniffer program, you can view and retrieve the user id and password of another user in your network.
Your next action?
Once you know how the process of hacking, it's like you want data or hotspot that you have and you find that exploitation. if you want to report to the admin that there are weaknesses hotspot, you have become part of the Ethical hackers. but, even if you use the hotspot, then you become Blackcap Hacker. you want to choose what to be, you are right. I only share info only. I hope this tutorial useful for you.
Source:
- Hack Proofing your network
- Hacking wireless networks for dummies
- Http://www.ethicalhacker.net/content/view/16/24/
No comments:
Post a Comment
ur comment..