How to Hack Wireless InternetConnections in 3 Easy Steps             INF0ANU     The world of possibilities…
How to Hack Wireless Internet             Connections   This presentation is intended to inform the    audience about met...
Wireless Internet The term “wireless internet” is perfectly  self-explanatory. It is internet access  without the use of ...
Wireless Internet EquipmentFor home use, the basic equipment is: Wireless NIC card Wireless router or access point Inte...
Advantages No wires Mobility Faster speeds Widely available equipment Convenience Inexpensive to set-up
Disadvantages Limited range Interference with other wireless access  points Encryption can be broken even at its  stron...
Hacking Wireless Internet   Wireless networks are very common. It is    also very common to find wireless    networks tha...
Wireless Encryption   The main source of vulnerability    associated with wireless networks are the    methods of encrypt...
WEP   Stands for Wired Equivalent Privacy.     Breakable even when configured correctly     Can be broken in as little ...
WPA or WPA2   Stands for Wi-Fi Protected Access   Created to provide stronger security   Still able to be cracked if a ...
A little info… When a user uses wireless internet they  generate what are called data “packets”. Packets are transmitted...
More info… Depending on how long the computer is  connected, it can generate a certain  number of packets per day. The m...
First… You must locate the wireless signal This can be done by using your default  Windows tool “View Available Wireless...
Second… Once you located a wireless network you  can connect to it unless it is using  authentication or encryption. If ...
AirSnort AirSnort must gather about 5 to 10 million  packets before it can even begin to crack  a wireless key. This cou...
Third… Once AirSnort has recovered enough  packets it will then go to work on reading  the captured information gathered ...
Prevent Your Network from Getting             Hacked   Don’t broadcast your SSID . This is usually    done during the set...
Prevent Your Network from Getting             Hacked   There is no such thing as 100% percent    security when using wire...
THE END
Upcoming SlideShare
Loading in...5
×

How to hack wireless internet connections

15,729

Published on

Published in: Technology
3 Comments
3 Likes
Statistics
Notes
  • Nice article thank you sharing this presentation! how to hack wifi password on android I really Appreciated!!!
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • nice
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • This is a old version download latest version from here. this version works very better. Direct download: http://bit.ly/12rUOWq

    . .
    . . . .
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
No Downloads
Views
Total Views
15,729
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
104
Comments
3
Likes
3
Embeds 0
No embeds

No notes for slide

How to hack wireless internet connections

  1. 1. How to Hack Wireless InternetConnections in 3 Easy Steps INF0ANU The world of possibilities…
  2. 2. How to Hack Wireless Internet Connections This presentation is intended to inform the audience about methods used to “hack” wireless internet connections, not for any malicious use but strictly for educational purposes and personal intentions such as recovering a misplaced network key for the users own wireless connection.
  3. 3. Wireless Internet The term “wireless internet” is perfectly self-explanatory. It is internet access without the use of wires. Instead it uses radio frequency bands to exchange information between your computer and the Internet. Wireless access allows users to connect to the internet from any location within range of a wireless access point.
  4. 4. Wireless Internet EquipmentFor home use, the basic equipment is: Wireless NIC card Wireless router or access point Internet access
  5. 5. Advantages No wires Mobility Faster speeds Widely available equipment Convenience Inexpensive to set-up
  6. 6. Disadvantages Limited range Interference with other wireless access points Encryption can be broken even at its strongest
  7. 7. Hacking Wireless Internet Wireless networks are very common. It is also very common to find wireless networks that are unsecured. Maybe the users are lazy or maybe they are not savvy when it comes wireless networks. Whatever the reason, hackers have found wireless networks relatively easy to break into, and even use wireless technology to crack into non-wireless networks.
  8. 8. Wireless Encryption The main source of vulnerability associated with wireless networks are the methods of encryption. There are a few different type of wireless encryption including:
  9. 9. WEP Stands for Wired Equivalent Privacy.  Breakable even when configured correctly  Can be broken in as little as 3 minutes
  10. 10. WPA or WPA2 Stands for Wi-Fi Protected Access Created to provide stronger security Still able to be cracked if a short password is used. If a long passphrase or password is used, these protocol are virtually uncrackable. Even with good passwords or phrases, unless you really know what your doing, wireless networks can be hacked and here’s how…….
  11. 11. A little info… When a user uses wireless internet they generate what are called data “packets”. Packets are transmitted between the wireless NIC card and the wireless access point via radio waves whenever the computer is connected with the access point.
  12. 12. More info… Depending on how long the computer is connected, it can generate a certain number of packets per day. The more users that are connected to one access point, the more packets are generated.
  13. 13. First… You must locate the wireless signal This can be done by using your default Windows tool “View Available Wireless Network” More useful tools include NetStumbler and Kismet. Kismet has an advantage over the other because it can pick up wireless signals that are not broadcasting their SSID.
  14. 14. Second… Once you located a wireless network you can connect to it unless it is using authentication or encryption. If it is using authentication or encryption then the next step would be to use AirSnort, a tool for sniffing out and cracking WEP keys.
  15. 15. AirSnort AirSnort must gather about 5 to 10 million packets before it can even begin to crack a wireless key. This could take anywhere between a few minutes to a few weeks depending on how many packets are being generated. If a small number of people are using the network then it will most likely take weeks.
  16. 16. Third… Once AirSnort has recovered enough packets it will then go to work on reading the captured information gathered from the packets and crack the key giving you access. Other tools such as CowPatty can use dictionary files to crack hard WPA keys.
  17. 17. Prevent Your Network from Getting Hacked Don’t broadcast your SSID . This is usually done during the setup of your wireless router. Change the default router login to something else. If your equipment supports it, use WPA or WPA 2 because it offers better encryption which is still able to be broken but much harder. Always check for updates to your router. Turn off your router or access point when not using it.
  18. 18. Prevent Your Network from Getting Hacked There is no such thing as 100% percent security when using wireless networks but at least with these few simple steps you can make it harder for the average person to break into your network.
  19. 19. THE END
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×