SlideShare a Scribd company logo
How to Hack Wireless InternetHow to Hack Wireless Internet
Connections in 3 Easy StepsConnections in 3 Easy Steps
PresentedPresented
ByBy
Joshua JohnsonJoshua Johnson
How to Hack Wireless InternetHow to Hack Wireless Internet
ConnectionsConnections
 This presentation is intended to inform theThis presentation is intended to inform the
audience about methods used to “hack”audience about methods used to “hack”
wireless internet connections, not for anywireless internet connections, not for any
malicious use but strictly for educationalmalicious use but strictly for educational
purposes and personal intentions such aspurposes and personal intentions such as
recovering a misplaced network key forrecovering a misplaced network key for
the users own wireless connection.the users own wireless connection.
Wireless InternetWireless Internet
 The term “wireless internet” is perfectlyThe term “wireless internet” is perfectly
self-explanatory. It is internet accessself-explanatory. It is internet access
without the use of wires. Instead it useswithout the use of wires. Instead it uses
radio frequency bands to exchangeradio frequency bands to exchange
information between your computer andinformation between your computer and
the Internet.the Internet.
 Wireless access allows users toWireless access allows users to connectconnect
to the internet from any location withinto the internet from any location within
range of a wireless access point.range of a wireless access point.
Wireless Internet EquipmentWireless Internet Equipment
For home use, the basic equipment is:For home use, the basic equipment is:
 Wireless NIC cardWireless NIC card
 Wireless router or access pointWireless router or access point
 Internet accessInternet access
AdvantagesAdvantages
 No wiresNo wires
 MobilityMobility
 Faster speedsFaster speeds
 Widely available equipmentWidely available equipment
 ConvenienceConvenience
 Inexpensive to set-upInexpensive to set-up
DisadvantagesDisadvantages
 Limited rangeLimited range
 Interference with other wireless accessInterference with other wireless access
pointspoints
 Encryption can be broken even at itsEncryption can be broken even at its
strongeststrongest
Hacking Wireless InternetHacking Wireless Internet
 Wireless networks are very common. It isWireless networks are very common. It is
also very common to find wirelessalso very common to find wireless
networks that are unsecured. Maybe thenetworks that are unsecured. Maybe the
users are lazy or maybe they are notusers are lazy or maybe they are not
savvy when it comes wireless networks.savvy when it comes wireless networks.
Whatever the reason, hackers have foundWhatever the reason, hackers have found
wireless networks relatively easy to breakwireless networks relatively easy to break
into, and even use wireless technology tointo, and even use wireless technology to
crack into non-wireless networks.crack into non-wireless networks.
Wireless EncryptionWireless Encryption
 The main source of vulnerabilityThe main source of vulnerability
associated with wireless networks are theassociated with wireless networks are the
methods of encryption. There are a fewmethods of encryption. There are a few
different type of wireless encryptiondifferent type of wireless encryption
including:including:
WEPWEP
 Stands for Wired Equivalent Privacy.Stands for Wired Equivalent Privacy.
Breakable even when configured correctlyBreakable even when configured correctly
Can be broken in as little as 3 minutesCan be broken in as little as 3 minutes
WPA or WPA2WPA or WPA2
 Stands for Wi-Fi Protected AccessStands for Wi-Fi Protected Access
 Created to provide stronger securityCreated to provide stronger security
 Still able to be cracked if a short password isStill able to be cracked if a short password is
used.used.
 If a long passphrase or password is used, theseIf a long passphrase or password is used, these
protocol are virtually uncrackable.protocol are virtually uncrackable.
 Even with good passwords or phrases, unlessEven with good passwords or phrases, unless
you really know what your doing, wirelessyou really know what your doing, wireless
networks can be hacked and here’s how…….networks can be hacked and here’s how…….
A little info…A little info…
 When a user uses wireless internet theyWhen a user uses wireless internet they
generate what are called data “packets”.generate what are called data “packets”.
 Packets are transmitted between thePackets are transmitted between the
wireless NIC card and the wireless accesswireless NIC card and the wireless access
point via radio waves whenever thepoint via radio waves whenever the
computer is connected with the accesscomputer is connected with the access
point.point.
More info…More info…
 Depending on how long the computer isDepending on how long the computer is
connected, it can generate a certainconnected, it can generate a certain
number of packets per day.number of packets per day.
 The more users that are connected to oneThe more users that are connected to one
access point, the more packets areaccess point, the more packets are
generated.generated.
First…First…
 You must locate the wireless signalYou must locate the wireless signal
 This can be done by using your defaultThis can be done by using your default
Windows tool “View Available WirelessWindows tool “View Available Wireless
Network”Network”
 More useful tools include NetStumbler andMore useful tools include NetStumbler and
Kismet. Kismet has an advantage over theKismet. Kismet has an advantage over the
other because it can pick up wirelessother because it can pick up wireless
signals that are not broadcasting theirsignals that are not broadcasting their
SSID.SSID.
Second…Second…
 Once you located a wireless network youOnce you located a wireless network you
can connect to it unless it is usingcan connect to it unless it is using
authentication or encryption.authentication or encryption.
 If it is using authentication or encryptionIf it is using authentication or encryption
then the next step would be to usethen the next step would be to use
AirSnort, a tool for sniffing out andAirSnort, a tool for sniffing out and
cracking WEP keys.cracking WEP keys.
AirSnortAirSnort
 AirSnort must gather about 5 to 10 millionAirSnort must gather about 5 to 10 million
packets before it can even begin to crackpackets before it can even begin to crack
a wireless key.a wireless key.
 This could take anywhere between a fewThis could take anywhere between a few
minutes to a few weeks depending on howminutes to a few weeks depending on how
many packets are being generated. If amany packets are being generated. If a
small number of people are using thesmall number of people are using the
network then it will most likely take weeks.network then it will most likely take weeks.
Third…Third…
 Once AirSnort has recovered enoughOnce AirSnort has recovered enough
packets it will then go to work on readingpackets it will then go to work on reading
the captured information gathered fromthe captured information gathered from
the packets and crack the key giving youthe packets and crack the key giving you
access.access.
 Other tools such as CowPatty can useOther tools such as CowPatty can use
dictionary files to crack hard WPA keys.dictionary files to crack hard WPA keys.
Prevent Your Network from GettingPrevent Your Network from Getting
HackedHacked
 Don’t broadcast your SSID . This is usuallyDon’t broadcast your SSID . This is usually
done during the setup of your wireless router.done during the setup of your wireless router.
 Change the default router login to somethingChange the default router login to something
else.else.
 If your equipment supports it, use WPA or WPAIf your equipment supports it, use WPA or WPA
2 because it offers better encryption which is still2 because it offers better encryption which is still
able to be broken but much harder.able to be broken but much harder.
 Always check for updates to your router.Always check for updates to your router.
 Turn off your router or access point when notTurn off your router or access point when not
using it.using it.
Prevent Your Network from GettingPrevent Your Network from Getting
HackedHacked
 There is no such thing as 100% percentThere is no such thing as 100% percent
security when using wireless networks butsecurity when using wireless networks but
at least with these few simple steps youat least with these few simple steps you
can make it harder for the average personcan make it harder for the average person
to break into your network.to break into your network.
THE ENDTHE END

More Related Content

What's hot

WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and Protection
Chandrak Trivedi
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
inventy
 
WiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & Defence
Prakashchand Suthar
 
Packet sniffers
Packet sniffersPacket sniffers
Packet sniffers
Wanwen Wen
 
WIFI Hacking
WIFI HackingWIFI Hacking
WIFI Hacking
Suraj Bohara
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
Agris Ameriks
 
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless NetworksLiving in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Chema Alonso
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutions
AirTight Networks
 
WLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALAWLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALA
Saikiran Panjala
 
Wireless Hacking
Wireless HackingWireless Hacking
Wireless Hacking
VIKAS SINGH BHADOURIA
 
Wlan networking and security
Wlan networking and securityWlan networking and security
Wlan networking and security
akki_hearts
 
Hacking Wireless Networks : Null Delhi (November)
Hacking Wireless Networks : Null Delhi (November)Hacking Wireless Networks : Null Delhi (November)
Hacking Wireless Networks : Null Delhi (November)
Mandeep Jadon
 
Presentation
PresentationPresentation
Presentation
darshpreet kaur
 
Wlan security
Wlan securityWlan security
Wlan security
Upasona Roy
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
Shital Kat
 
Security & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case StudySecurity & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case Study
Mohammad Mahmud Kabir
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
Vignesh Suresh
 
Network Security
Network SecurityNetwork Security
Network Security
MAJU
 
Wlan security
Wlan securityWlan security
Wlan security
Sajan Sahu
 
Wireless Lan Security
Wireless Lan SecurityWireless Lan Security
Wireless Lan Security
SANDEEPONSLIDESHARE
 

What's hot (20)

WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and Protection
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
WiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & Defence
 
Packet sniffers
Packet sniffersPacket sniffers
Packet sniffers
 
WIFI Hacking
WIFI HackingWIFI Hacking
WIFI Hacking
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless NetworksLiving in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutions
 
WLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALAWLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALA
 
Wireless Hacking
Wireless HackingWireless Hacking
Wireless Hacking
 
Wlan networking and security
Wlan networking and securityWlan networking and security
Wlan networking and security
 
Hacking Wireless Networks : Null Delhi (November)
Hacking Wireless Networks : Null Delhi (November)Hacking Wireless Networks : Null Delhi (November)
Hacking Wireless Networks : Null Delhi (November)
 
Presentation
PresentationPresentation
Presentation
 
Wlan security
Wlan securityWlan security
Wlan security
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
Security & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case StudySecurity & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case Study
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Wlan security
Wlan securityWlan security
Wlan security
 
Wireless Lan Security
Wireless Lan SecurityWireless Lan Security
Wireless Lan Security
 

Similar to Howtohackwirelessinternetconnections 100105124156-phpapp01

How To Hack Wireless Internet Connections
How To Hack Wireless Internet ConnectionsHow To Hack Wireless Internet Connections
How To Hack Wireless Internet Connections
guest85e156e
 
Wireless security
Wireless securityWireless security
Wireless security
Aurobindo Nayak
 
Wireless hacking tools.jpeg
Wireless hacking tools.jpegWireless hacking tools.jpeg
Wireless hacking tools.jpeg
Tushant sharma
 
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdfWireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
SeanHussey8
 
Wireless security
Wireless securityWireless security
Wireless security
Nguyen Minh Thu
 
Wireless security by mujajhid rana
Wireless security by mujajhid ranaWireless security by mujajhid rana
Wireless security by mujajhid rana
Mujahid Rana
 
Securing the Use of Wireless Fidelity (WiFi) in Libraries
Securing the Use of Wireless Fidelity (WiFi) in LibrariesSecuring the Use of Wireless Fidelity (WiFi) in Libraries
Securing the Use of Wireless Fidelity (WiFi) in Libraries
Philippine Association of Academic/Research Librarians
 
10 Wireless Home Network Security Tips
10 Wireless Home Network Security Tips10 Wireless Home Network Security Tips
10 Wireless Home Network Security Tips
PECB
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level security
Chetan Kumar S
 
Auditing a Wireless Network and Planning for a Secure WLAN Implementation
Auditing a Wireless Network and Planning for a Secure WLAN ImplementationAuditing a Wireless Network and Planning for a Secure WLAN Implementation
Auditing a Wireless Network and Planning for a Secure WLAN Implementation
CARMEN ALCIVAR
 
CEH Domain 6.pdf
CEH Domain 6.pdfCEH Domain 6.pdf
CEH Domain 6.pdf
infosec train
 
Domain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network HackingDomain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network Hacking
ShivamSharma909
 
Public wifi
Public wifiPublic wifi
Public wifi
Samuel K. Itotia
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
Michael Boman
 
Technical Report
Technical ReportTechnical Report
Technical Report
stuartsearles
 
Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)
Saravana Kumar
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
Muhammad Zia
 
Computer Science, Ethical Hacking.pdf
Computer Science, Ethical Hacking.pdfComputer Science, Ethical Hacking.pdf
Computer Science, Ethical Hacking.pdf
facttech solution
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Wirless Security By Zohaib Zeeshan
Wirless Security By Zohaib ZeeshanWirless Security By Zohaib Zeeshan
Wirless Security By Zohaib Zeeshan
Zaibi Gondal
 

Similar to Howtohackwirelessinternetconnections 100105124156-phpapp01 (20)

How To Hack Wireless Internet Connections
How To Hack Wireless Internet ConnectionsHow To Hack Wireless Internet Connections
How To Hack Wireless Internet Connections
 
Wireless security
Wireless securityWireless security
Wireless security
 
Wireless hacking tools.jpeg
Wireless hacking tools.jpegWireless hacking tools.jpeg
Wireless hacking tools.jpeg
 
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdfWireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
 
Wireless security
Wireless securityWireless security
Wireless security
 
Wireless security by mujajhid rana
Wireless security by mujajhid ranaWireless security by mujajhid rana
Wireless security by mujajhid rana
 
Securing the Use of Wireless Fidelity (WiFi) in Libraries
Securing the Use of Wireless Fidelity (WiFi) in LibrariesSecuring the Use of Wireless Fidelity (WiFi) in Libraries
Securing the Use of Wireless Fidelity (WiFi) in Libraries
 
10 Wireless Home Network Security Tips
10 Wireless Home Network Security Tips10 Wireless Home Network Security Tips
10 Wireless Home Network Security Tips
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level security
 
Auditing a Wireless Network and Planning for a Secure WLAN Implementation
Auditing a Wireless Network and Planning for a Secure WLAN ImplementationAuditing a Wireless Network and Planning for a Secure WLAN Implementation
Auditing a Wireless Network and Planning for a Secure WLAN Implementation
 
CEH Domain 6.pdf
CEH Domain 6.pdfCEH Domain 6.pdf
CEH Domain 6.pdf
 
Domain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network HackingDomain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network Hacking
 
Public wifi
Public wifiPublic wifi
Public wifi
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
 
Technical Report
Technical ReportTechnical Report
Technical Report
 
Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Computer Science, Ethical Hacking.pdf
Computer Science, Ethical Hacking.pdfComputer Science, Ethical Hacking.pdf
Computer Science, Ethical Hacking.pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Wirless Security By Zohaib Zeeshan
Wirless Security By Zohaib ZeeshanWirless Security By Zohaib Zeeshan
Wirless Security By Zohaib Zeeshan
 

Recently uploaded

SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
maazsz111
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
marufrahmanstratejm
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 

Recently uploaded (20)

SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 

Howtohackwirelessinternetconnections 100105124156-phpapp01

  • 1. How to Hack Wireless InternetHow to Hack Wireless Internet Connections in 3 Easy StepsConnections in 3 Easy Steps PresentedPresented ByBy Joshua JohnsonJoshua Johnson
  • 2. How to Hack Wireless InternetHow to Hack Wireless Internet ConnectionsConnections  This presentation is intended to inform theThis presentation is intended to inform the audience about methods used to “hack”audience about methods used to “hack” wireless internet connections, not for anywireless internet connections, not for any malicious use but strictly for educationalmalicious use but strictly for educational purposes and personal intentions such aspurposes and personal intentions such as recovering a misplaced network key forrecovering a misplaced network key for the users own wireless connection.the users own wireless connection.
  • 3. Wireless InternetWireless Internet  The term “wireless internet” is perfectlyThe term “wireless internet” is perfectly self-explanatory. It is internet accessself-explanatory. It is internet access without the use of wires. Instead it useswithout the use of wires. Instead it uses radio frequency bands to exchangeradio frequency bands to exchange information between your computer andinformation between your computer and the Internet.the Internet.  Wireless access allows users toWireless access allows users to connectconnect to the internet from any location withinto the internet from any location within range of a wireless access point.range of a wireless access point.
  • 4. Wireless Internet EquipmentWireless Internet Equipment For home use, the basic equipment is:For home use, the basic equipment is:  Wireless NIC cardWireless NIC card  Wireless router or access pointWireless router or access point  Internet accessInternet access
  • 5. AdvantagesAdvantages  No wiresNo wires  MobilityMobility  Faster speedsFaster speeds  Widely available equipmentWidely available equipment  ConvenienceConvenience  Inexpensive to set-upInexpensive to set-up
  • 6. DisadvantagesDisadvantages  Limited rangeLimited range  Interference with other wireless accessInterference with other wireless access pointspoints  Encryption can be broken even at itsEncryption can be broken even at its strongeststrongest
  • 7. Hacking Wireless InternetHacking Wireless Internet  Wireless networks are very common. It isWireless networks are very common. It is also very common to find wirelessalso very common to find wireless networks that are unsecured. Maybe thenetworks that are unsecured. Maybe the users are lazy or maybe they are notusers are lazy or maybe they are not savvy when it comes wireless networks.savvy when it comes wireless networks. Whatever the reason, hackers have foundWhatever the reason, hackers have found wireless networks relatively easy to breakwireless networks relatively easy to break into, and even use wireless technology tointo, and even use wireless technology to crack into non-wireless networks.crack into non-wireless networks.
  • 8. Wireless EncryptionWireless Encryption  The main source of vulnerabilityThe main source of vulnerability associated with wireless networks are theassociated with wireless networks are the methods of encryption. There are a fewmethods of encryption. There are a few different type of wireless encryptiondifferent type of wireless encryption including:including:
  • 9. WEPWEP  Stands for Wired Equivalent Privacy.Stands for Wired Equivalent Privacy. Breakable even when configured correctlyBreakable even when configured correctly Can be broken in as little as 3 minutesCan be broken in as little as 3 minutes
  • 10. WPA or WPA2WPA or WPA2  Stands for Wi-Fi Protected AccessStands for Wi-Fi Protected Access  Created to provide stronger securityCreated to provide stronger security  Still able to be cracked if a short password isStill able to be cracked if a short password is used.used.  If a long passphrase or password is used, theseIf a long passphrase or password is used, these protocol are virtually uncrackable.protocol are virtually uncrackable.  Even with good passwords or phrases, unlessEven with good passwords or phrases, unless you really know what your doing, wirelessyou really know what your doing, wireless networks can be hacked and here’s how…….networks can be hacked and here’s how…….
  • 11. A little info…A little info…  When a user uses wireless internet theyWhen a user uses wireless internet they generate what are called data “packets”.generate what are called data “packets”.  Packets are transmitted between thePackets are transmitted between the wireless NIC card and the wireless accesswireless NIC card and the wireless access point via radio waves whenever thepoint via radio waves whenever the computer is connected with the accesscomputer is connected with the access point.point.
  • 12. More info…More info…  Depending on how long the computer isDepending on how long the computer is connected, it can generate a certainconnected, it can generate a certain number of packets per day.number of packets per day.  The more users that are connected to oneThe more users that are connected to one access point, the more packets areaccess point, the more packets are generated.generated.
  • 13. First…First…  You must locate the wireless signalYou must locate the wireless signal  This can be done by using your defaultThis can be done by using your default Windows tool “View Available WirelessWindows tool “View Available Wireless Network”Network”  More useful tools include NetStumbler andMore useful tools include NetStumbler and Kismet. Kismet has an advantage over theKismet. Kismet has an advantage over the other because it can pick up wirelessother because it can pick up wireless signals that are not broadcasting theirsignals that are not broadcasting their SSID.SSID.
  • 14. Second…Second…  Once you located a wireless network youOnce you located a wireless network you can connect to it unless it is usingcan connect to it unless it is using authentication or encryption.authentication or encryption.  If it is using authentication or encryptionIf it is using authentication or encryption then the next step would be to usethen the next step would be to use AirSnort, a tool for sniffing out andAirSnort, a tool for sniffing out and cracking WEP keys.cracking WEP keys.
  • 15. AirSnortAirSnort  AirSnort must gather about 5 to 10 millionAirSnort must gather about 5 to 10 million packets before it can even begin to crackpackets before it can even begin to crack a wireless key.a wireless key.  This could take anywhere between a fewThis could take anywhere between a few minutes to a few weeks depending on howminutes to a few weeks depending on how many packets are being generated. If amany packets are being generated. If a small number of people are using thesmall number of people are using the network then it will most likely take weeks.network then it will most likely take weeks.
  • 16. Third…Third…  Once AirSnort has recovered enoughOnce AirSnort has recovered enough packets it will then go to work on readingpackets it will then go to work on reading the captured information gathered fromthe captured information gathered from the packets and crack the key giving youthe packets and crack the key giving you access.access.  Other tools such as CowPatty can useOther tools such as CowPatty can use dictionary files to crack hard WPA keys.dictionary files to crack hard WPA keys.
  • 17. Prevent Your Network from GettingPrevent Your Network from Getting HackedHacked  Don’t broadcast your SSID . This is usuallyDon’t broadcast your SSID . This is usually done during the setup of your wireless router.done during the setup of your wireless router.  Change the default router login to somethingChange the default router login to something else.else.  If your equipment supports it, use WPA or WPAIf your equipment supports it, use WPA or WPA 2 because it offers better encryption which is still2 because it offers better encryption which is still able to be broken but much harder.able to be broken but much harder.  Always check for updates to your router.Always check for updates to your router.  Turn off your router or access point when notTurn off your router or access point when not using it.using it.
  • 18. Prevent Your Network from GettingPrevent Your Network from Getting HackedHacked  There is no such thing as 100% percentThere is no such thing as 100% percent security when using wireless networks butsecurity when using wireless networks but at least with these few simple steps youat least with these few simple steps you can make it harder for the average personcan make it harder for the average person to break into your network.to break into your network.