Archive

Posts Tagged ‘wireless hack’

Wireless Hack I

December 27, 2009 1 comment

With easy access to the internet via wireless, many laptop users are always looking for or use an existing hotspots to always active. There is simply open the email, there is cuman just browsing, even, there is also a duty to send the office. The pemilk and hotspot users do not realize that perhaps, among them are evil intent. For simple cases, a false public hotspots can trap the users to provide their username and password without them realizing that they had given. in this article, I’ll explain some of the tricks used by some people who intend on using wireless ugly. To prevent problems, can be seen in other articles on this website which provides solutions and prevention.

To make wireless hacking, which is the first step is to find the nearest wireless network with you. It can be done with wardrive (if done outside the room) or around hotspots around the existing (if at in the room). In this article, the author tried to describe how to use wardrive for more secure and remember we are only trying to find out which wireless networks are weak.

Wardrive

Wardrive is an electronic fishing expedition to find a weak wireless networks around you. Most, most of these wireless networks are not even given a password or encryption to protect it.
This activity is carried out to search for any network that will be the object of attack. Thus, we can conduct attacks on wireless networks that we have to target. To do this kegitan, simple equipment needed to get started.

List of required equipment:
• GPS receiver
If your area already has GPS, you can easily mark any areas that you have explored and specific signals in the area where you explore these already have a weak wireless networks.

• Wireless PCMI card
This equipment is needed to expand your wireless network. Typically, this equipment is equipped with a jack for wireless receiver antenna or cellular network support for a broader network.

• Wireless antenna receiver
This equipment is needed to increase the reach of PCMI wireless card that you have to connect it has jack to the wireless card. If the wireless card you have do not have a jack, you can buy a wireless antenna using a usb port that has a lot on the market. But, if you are not satisfied with the ability to acquire a network using equipment you have, you can membikinnya cheaply by following the instructions at the following website:
http://www.instructables.com/id/EQARE4I72GEPUCHTHU/

Search Wireless Network

Most wireless networks that supply does not have a security or encryption to protect it. To investigate, the support equipment needed. There are two tools that are usually used for this purpose.

• Network stumbler or better known as NetStumbler
This Windows-based software is very easy to find wireless signals emitted from the hotspots to the user. Meet the author of many wireless users use this software to find the right location to get a wireless signal from a strong hotspot or hotspot in the survey area is good enough or not.

• Kismet
One function is missing from NetStumbler is the ability to display the SSID of the hotspot. the access point, they are always routine membroadcast this info. cuman, it mostly contains info SSID that is not readable or encrypted. This program will find and display the SSID is not broadcast by the hotspot and is very important to find wireless networks to be tested.

Entering the wireless networks that have been found

After finding a network of networks, the next step is to try to connect you to the network. If the network does not use security encryption, you can directly access the SSID. If the SSID is not broadcast, you can enter the SSID is not broadcast. Of course, you can easily find that is not in the broadcast using the existing features of kismet is not it? If the network is encrypted, you need one of the following equipment.

• CowPatty
This software uses brute-force method to open a WPA-PSK, PSK itself which is considered as a new WEP wireless security security unrtuk in this rumah.Progam try some of the various options from a dictionary file if anyone is in accordance with what is used as the key

• ASLeap
if any network using LEAP, this tool can be used to find the kind of data the username and password are online at the network, and access override pemiliknya.LEAP not protect the process such as EAP, which was a major weakness for the LEAP.

Sniff or steal Wireless Data

No matter whether you are connected directly to a wireless network or not, if there is a wireless network in your immediate area, there’s always passing the data on the network whenever it was. To retrieve data, you need tools to retrieve or view data.

• Wireshark (Ethereal predecessor)
which is still a debate how ynag fastest way in addressing this program, there is no doubt that this software is very useful. he can find an existing wireless network complete with security info. This software can mecuri data from the 802.11 hotspot management and can also be used as a tool to search for hotspots that do not protect themselves with the SSID.

• SwitchSniffer
This software is a program that can search for active users in the LAN switch network and can retrieve all data packets without the approval of the relevant user, this software can also detect arpspoofer program is running and defense membokir such firewal sessions. if you combine this program with another sniffer program, you can view and retrieve user id and password of another user in your network.

Your next action?

Once you know how the process of hacking, it’s up to you what to do with data or hotspots that you have found and you exploit it. if you want to report to admin hotspots that there is a weakness, you have become part of the Ethical hackers. but, if you even further exploit these hotspots, then you become Blackcap Hacker. You want to choose to be what, you were right. authors simply share info only. This tutorial may be useful for you.