1 2

Learn techniques and methods used by hackers to penetrate Wi-Fi

We will look at this subject to the months and the most important ways to break through Wi-Fi. The aim of the knowledge of these roads are for protection only, and this issue is not an invitation to learn to penetrate the wireless network of others or public wireless networks.
 تعرف على الأساليب والطرق التي يستخدمها الهاكرز في اختراق الواي فاي

First: What you need to know about Wi-Fi "briefly"

What is WiFi:

The word is an abbreviation for Wireless Fidelity, any wireless transmission superior accuracy and speed. This transmission uses radio waves instead of wires to exchange Albaaanat as it is able to penetrate walls and barriers, and high-speed transfer and receive data.

Note: Wi-Fi pollute the environment as a result of the electromagnetic field emitted from him as he destroys the tissues of the trees.

There are 3 encodings of data Wi-Fi: -
-WEP "Wired Equivalent Privacy"
Encodings are the weakest and which has become porous and will know how the hacker broke this Alchwirh
So do not prefer to use this Alchwirh anymore.
WPA / WPA2 "WiFi Protected Access"
WPA2 encrypted stronger than WPA encrypted because it uses an algorithm CCMP "Counter Mode CBC-MAC Protocol", which takes the type of strong encryption called AES "Advanced Encryption Standard"
While WPA encryption type called TKIP "Temporal Key Integrity Protocol", which revolves around the algorithms used in WEP.
Prefers to use WPA2 encrypted, although he can penetrate some tools Allinieks "We will look into some of these tools."

Note: breakthrough Wi-Fi is a risk of a very large setups .. where the hacker can doing a sniffer or a breach of existing hardware with him on the network.

This picture shows the work of the sniffer

-walon Together to know how the hacker hacked Wi-Fi and protection of these ways:

* First: Using Windows: -

Roads that are used in Windows novice hackers so they are very dangerous because any tyro can exploit
And methods of Windows: -

The first method: the so-called WPS injection, which exploit the property of the WPS was open in the router Valhakr can easily to enter the Wi-Fi your if you Enabled property of the WPS and the piece through only two first brings the hacker the Pin private b WPS, for example, one of the tools and doing this the pin connection through a smartphone or a tool of Oandoz..ollhamaih of this method, you must disable WPS in Alrotr..osov Explain how disabled.

The second method: This method is indirect and is based on EPON

You must know that your IP will be very close to any of my neighbors, especially if the same company as the Internet .. hacker doing my scope of any region .. How? For example, your IP is 111.111.111.11 Balhakr hacker who shall work domain, for example, the range 111.111.111.0 to 111,111,111,255 and doing a population on this scale is known for its open Alaepahat Port 80 using a single Windows tools .. I mean tool scans all ABC of 111.111. 111.0 to 111,111,111,255 and graduated hacker every EPON Open by Port 80 everything he does hacker to enter for EPON Using the browser opens a panel log on if the owner of the router does not change it will Filter Results admin and password admin and there are sites offering login data essential for each Rutter For example, this famous site: Routerpasswords.com and will be explained in detail just choose the type of router, which gives you the data is often the formation of admin and admin .. if you changer password found in most of the router loophole rom-0 .. What?

Valenfterd me that any victim who shall hacker 4.4.4.4 Status / rom-0 becomes 4.4.4.4/rom-0 if the file was downloaded Valrotr hacker takes an infected file and bump on this site http://198.61.167.113/zynos shows him your password Balrotr .

How to protect yourself from this method:

First, you should change the main password for your router

In order to change the password answer the Default Gateway via the cmd to open the run and then start to write the cmd

Show you a black screen where you write ipconfig

And looking for the word Default Gateway IP address you will find next to Bacon often 192.168.1.1

Open it in your browser Hatalb you Yoezer Nim and Basord

If you do not change them in advance that you can repeat them come from this site

routerpasswords.com determine the type of router and press find password

And looked you in the event of failure of the data log, but you have to work to resetRutter

It is a very small button in the router if you press it, God willing, you can repeat entry .. and after login looking for the word Management and asks you to put the old password and then put the new password twice ..alan Basord you changed the router.
And also to disable the WPS not doing all this for the intervention to the Control Panel to disable the router and look for them in the settings of your Wi-Fi.

The loophole rom-0, you must change the Filter Results Nimes to enter because this loophole gives the hacker password only
Most devices do not support changing the router Filter Results Nim must change Balcala linix or Pac Trac

Will be developed to explain the inauguration of Alkali Lennox as a placebo on Windows

Explanation:

First open Altremnal and writes the nmap 192.168.1.1

And replace the IP address of the Default Gateway to your router and then wait a little appears this window

Port must be 23 private b telnet open

Then write telnet 192.168.1.1
And of course replaced EPON b Default Getaway

This window appears for you

Writes Basord router and pressing Inter

You will see the type of router shown in white LS is recorded and then pressing Inter syspressing Inter

Then write sys adminname mohamed

Mohamed replace the name that you want

Shown in red in the picture indicates that the user name was changed to the new name that we have chosen

Thus, we can access the modem settings that name + No one can enter into the settings of the modem, even got the file rom-0 because it does not contain the name of the user.

The third way: -

Trick is considered a fatal error in the result of Windows system

The hacker network making false (fake) network, which is similar to the victim, but puts no Basord

Which occurs when the victim to the real network disappear as a result of error in Windows .. "This bug is fixed in Windows 7 and 8"

It will appear when the victim's network again a replica of the real network ... after the victim's link with the phantom network, has fallen into the trap .. because the hacker will pierce through his computer and pulls Mitasploat password repository in the Registry in the victim's computer
To protect against this trick .. you should beware of false networks and avoid Windows XP.

Ways penetration systems and linux distro WiFislax: -

This road is one of the most powerful kinds of ways to penetrate the Wi-Fi.
Systems linux widely used in penetration testing is the most important of these regimes system Pak Trac, which was built on Ubuntu and then been re-built on Debian and dubbed kali linux and is one of the best distributions in penetration testing and protection and there are plenty of tools who specializes in decoding encodings Wi Fi.

The distribution is WiFislax specializes only in decoding encodings Wi-Fi, a very strong distribution as has the tools perform all the functions needed by the hacker in decoding encodings Wi-Fi.

All of these distributions hacker help in the work of the sniffer devices .. What is the sniffer?

When Wi-Fi is penetrating your hacker can stand intermediary between you and the Internet Visttia that pulls you enter passwords that were not encrypted .. and can steal your bank account if you do buy its way
Has been to explain how this client in the Code of Professional before .. therefore you must protect your Wi-Fi

Method of protection from penetration by Wi-Fi linux distributions and WiFislax?

1 work Basord too complex for Wi-Fi because most of these tools are a guess on the network "to be a number of characters and many blend between large and small letters, symbols and numbers."

2 Use WPA2 encrypted as we have said previously they encrypt the suffering of any other.

3 change your password periodically and follow-up callers to your network so you know that was impenetrable.

This is because there is no direct way to protect from breaking the encryption.


Comments
0 Comments

Welcome to Bets kyO blog

Writer

Welcome to the Best kyO is a blog for bloggers

Search in blog

Subscribe to receive all new

Get updates on the blogging moment by moment subscribe now