Hacking WiFi: Everything you need to know

The security in Wi-Fi networks is a topic that concerns both newbies and professionals, and both types of users have something in common : They know that a Wi-Fi network must be secure. And for this we hide the identity of our network using the tools provided by the router and we use passwords, in addition to many other measures that often have more reassuring value than a true security value.

However, despite Of all the steps we can take, we may not be as sure as we think. Outside there are many unscrupulous people who want to take our WiFi signal, either to be able to connect to the Internet for free or to access our system and from there to our devices, in order to find out something with what that can harm us.

 hack-wifi- (1)

If you want to be prepared to face any security threat on our WiFi network do not stop reading this post, where you will find a lot of information to be able to navigate and carry out our daily activities with total security that no one is spying on us.

Is it easy to hack a WiFi connection?

As one of the first measures that we have to take, it is necessary that we really learn which of the security measures that we can implement are effective or not, that is, if they really serve at the time of brake the attack of a trained hacker.

That is why from this point on, we will show you the security measures in most common and widespread WiFi networks among users, and We will comment on which of them are really useful to avoid or reject the attack of a hacker and which are simply for users without much knowledge.

 hack-wifi- (2)

a) Hiding the SSID from the network

Security by the obfuscation procedure has long since passed through, to such an extent that anyone with a minimum level of knowledge and the appropriate tools can access our hidden network.

The only users who will truly be harmed in the case of applying this method are the legitimate users of this network, that is, all those who use it for their daily tasks, who will not be able to see us when they try to connect with their computers.

 hack-wifi- (3)

But for the hacker it is not a problem, with his tools he has already been able to identify our network and he is getting down to work to access it. The only thing it lacks is the password, that is why we must put special emphasis on creating a good password.

b) WEP passwords

Passwords of the type WEP (Wired Equivalent Privacy), better known for their translation into Spanish “Privacy Equivalent to Wired ” is a fairly old to provide security to a wireless network.

Unfortunately, although they are easy to configure, the fact is that they are extremely easy to decipher, is only enough to use specialized software to “sniff” network traffic around the device. You can even find on the market a router that will automatically decrypt any wireless network protected with WEP passwords to retransmit and reuse it.

 hack-wifi- (4)

In this case, the best advice that can be given is to never use passwords of this type, since we could be at serious risk. Instead we should always use passwords of type WPA2-PSK, that provide much greater security. If our devices do not have WPA capability, it is best to get rid of them and upgrade with routers that do support the WPA standard.

c) WPA Passwords

If we think that being protected by a long, complicated password and WPA2-PSK security is the most secure thing in the world, we are one step away from being completely wrong. While WPA2-type passwords are strong and very secure, our security may still be compromised.

Few know that most modern routers include a technology called WPS ( Wi-Fi Protected Setup), a methodology developed by the Wi-Fi Alliance to simplify and facilitate the creation and configuration of secure WPA2 networks in the home or small office setting.

 hack-wifi- (5)

This allows the user to press a button on the router or enter an 8-digit password to seamlessly connect to wireless network devices such as Wi-Fi printers or others . In the case of the password, this can usually be seen printed on the packaging, the manuals or on the router itself. What is achieved with this method is to avoid the use of long passwords for such connection.

Unfortunately, this is the point that hackers have selected to develop their attacks, as a major vulnerability has been found. Although various methods have been implemented to counteract this failure, such as a pause of sixty seconds every 3 failed attempts, which means that it takes the attacker 7 years to break the security of our network.

But the truth is that cyber criminals have found other methods that would allow the hacker to enter our wireless network in just a few hours, taking advantage of the fact that not all manufacturers have put in practice such solutions.

 hack-wifi- (6)

Returning to the topic of WPS technology, First of all causing this problem, on some Wi-Fi routers it is still a prerequisite for authentication, and is enabled by default.

So what can we do to avoid inconvenience Before completely disable the WPS option making sure that another internal internal WPS PIN is not automatically set that causes any kind of security problem.

Another thing that we can also do is disable Wi-Fi and use a wired connection instead, which although it is extreme, can give us the protection we are looking for. Obviously, it is not always possible to carry out this procedure, but at least we will cut the time available to a possible attacker to try to access our network.

Procedures for the most expert

The following procedures are not recommended for those users who do not have sufficient experience in this type of activities. In the event that we are not sure that we can successfully carry out the operation, it will be best to resort to a computer technician, who will solve the problem, in exchange for obviously a small monetary reward.

 hack-wifi- (7)

Router firmware update

The router firmware update It is a practice that can give us good results to put one more stone on the security wall. To find out if our device has an update for its firmware, check the manufacturer’s website.

Installation of other firmwares

Another alternative we have available is to replace the firmware of the router with tools like Tomato and DD-WRT which can improve the capacity and security of any Broadcom chip based router .

 hack-wifi- (8)

Conclusion

It was possible to observe through reading this article, pretending that a connection via Wi-Fi is completely secure is a utopia, since there are too many elements in play that conspire to make a network easy enough to attack . The best thing is obviously not to use Wi-Fi, but this is not very wise or technical advice, since technology aims to let go of the cables that originally made computing what it is today.

One last piece of advice that we should take into account is simply be careful with some aspects such as in where we connect and from where we access our data and accounts, and of course not spread our information too much private through the network.

The dangers of hacking a WiFi network

It seems that not only who is the victim of the theft of your Wi-Fi connection can be victim, but also those who steal it. Computer security experts say that currently stealing bandwidth on an Internet connection using Wi-Fi, is an activity that can be compromising for both the thief and the stolen.

 hack-wifi- (9)

Currently, many ordinary users without much computer knowledge make the mistake of wanting Obtain certain advantages when accessing an Internet connection via Wi-Fi without paying for it, but it is very important to know exactly who belongs to the network that that user accesses, since a free Internet connection could become in a trap set there to steal their own data and credentials, thus giving them access to a wide range of private information that could be used against them.

 hack-wifi- (10)

That is, that these types of connections may be open for the purpose of facilitating the work of cybercriminals, given that once the user is unsuspecting and bold access this network, immediately pod It would be undergoing an in-depth analysis by hackers, who could spy on your communications, email passwords, chat, and most importantly of all, you could have access to all bank information such as card numbers credit and PIN numbers.

It should also be noted that can also infect your PC with some type of spyware, with which they could remotely know your movements even when the user has abandoned the network.

Obviously the main recommendation is not to sneak into any network, and for those users who have a legitimate connection the advice is to use Wi-Fi routers with WPA and WPA2 encryption systems, good passwords, subnetting and use filtered by MAC.

How to know if my WiFi is being hacked?

As users of In well know ternet, the first line of defense for our Wi-Fi network is encryption, that encrypts the data transmitted between the computer and the wireless router. This method is the most used to prevent other users or hackers from using our network for free or for illegal purposes.

 hack-wifi- (11)

Without However, for many well-trained hackers, encryption is a simple step to skip, especially if they have the time and resources to do so, and once they have entered our system, they are free to navigate it. wherever they want.

In these cases, if we are sure that there is some kind of suspicious movement on our network WiFi it is trying to know exactly which devices have entered it, with which we can establish if our security has been violated.

In order to know if someone has entered our WiFi network without permission, we have Wireless services Network Watcher, is a small utility free d which is capable of scanning our wireless network and showing us a detailed list of all the equipment and devices that are connected to it, which will allow us to easily and quickly find any other equipment that at that time is find connected to the network.

 hack-wifi- (12)

This spectacular software returns very useful results, since for each device or computer connected to our network, the application will show us the IP address, MAC address, the company that manufactured the network card and, optionally, the name of the computer.

All this information flow can be exported to different formats such as HTML, XML, CSV and TXT in order to be able to study them in greater detail .

Best of all, in addition to being free, Wireless Network Watcher does not require any installation . To start using it, all we have to do is download it to our computer, extract the executable file from the zip file, and click on it to execute it.

 hack-wifi- (13)

Of course the utility can only scan the wireless network to which we are connected and other wireless networks cannot be scanned.

It should be noted that Wireless Network Watcher is compatible with Windows XP, Windows 2000, Windows Server 2003/2008, Windows Vista, Windows 7 and Windows 10.

If you wish, you can download the application from its official site by clicking on this link.

How to protect my WiFi from hacks?

As we could see, the security of a WiFi network is not a matter to be taken lightly, since the price we must pay to be trusted Two or underestimating this topic may be too high.

I stop if we take a series of precautions regarding regarding the configuration of our Wi-Fi network we can prevent other people from take advantage of the lack of system security and use our Internet connection. But first we must detect these intruders.

To do this, from this point on, we will know everything we must do to protect our WiFi network from hackers and cybercriminals. We will also introduce you to a series of tools that can help me improve network performance and operability.

 hack-wifi- (14)

Although there is really nothing more comfortable than having a Wi-Fi network in our home, and thus being able to connect all our devices and computers to the Internet without the need for wiring, the truth is that one of the most frequent failures in this type of connection distribution system is usually security.

It is important to highlight that one of the most significant features of Wi-Fi networks is that in general are usually vulnerable to possible intrusions by external and unauthorized users .

If when creating a Wi-Fi network system in our home or office we have forgotten to activate the encrypted to prevent intruders, it is those who reach the connection are likely to begin using part of our band without authorization to access the Internet . Even, in some cases, even though the connection has encryption, it can happen that another external user hangs on our connection for various reasons.

Given the possibility that someone is stealing our WiFi connection, we must be vigilant to prevent this from happening, or to eliminate said intruder, since the only ones affected in this matter will be us, because the greater the number of users using our network, the slower Usual browsing will be us.

How to detect intruders in our Wi-Fi network

As we already mentioned, Wi-Fi networks tend to be more vulnerable than conventional networks so when installing such a network it is necessary to take certain precautions.

However, it may happen to us that even so , some intruder hangs on our Internet connection, causing us harm in connection performance . For this reason, it is extremely important to know how to recognize the most frequent symptoms that can appear when an intruder appears in our network.

One One of the most frequent symptoms resides in the perception of a noticeable change in connection speed, that may become evident during any download that we are making from the Internet, or simply during navigation. The first thing we must do to detect intruders is to carefully observe the behavior of our Wi-Fi router in order to detect activities

To do this, it is recommended to turn off all the devices and computers that we have at home, or just disconnect them from the network. Once we have disconnected all the equipment, we must observe the lights of the different indicators of the router .

If we see that even with the devices not working there is a series of flashes fast and continuous, then we are faced with the presence of an intruder on our network, since this shows that there is some remote device that is connected and performing a transmission of information flow.

Tools to detect intruders on Wi-Fi networks

In addition to Wireless Network Watcher, a app to detect intruders on the network WiFi mentioned above in this post, one of the most recommended items to detect intruders on our home Wi-Fi network is to use a meter connection speed connection to the Internet, which will allow us to discover whether or not there is a true loss of bandwidth.

As we all know, the presence of an unauthorized user on our network will inevitably cause the download speed that we can achieve with our Internet connection to be affected .

Likewise , we can find the case of discovering our blocked IP in download sites, such as the popular Mega, because perhaps the intruder is currently downloading material, taking advantage of our connection and our IP address.

To detect this type of problem, there are a wide variety of computer tools, such as BASpeed ​​which is undoubtedly one of the best in this regard, which allow know exactly the download speed and thus confirm the intrusion if it is occurring.

You can download BASpeed ​​ by clicking on this link.

There are also tools that are dedicated purely and exclusively to hunt for intruders in WiFi networks, as is the case with AirSnare . This application works by listening to the traffic that is transmitted through the network adapter, and obtains all the MAC addresses connected to our local network.

With this the intruders are quickly detected . You can download AirSnare by clicking on this link .

 

With a series of special tools, it is possible easily detect the presence of intruders on our home Wi-Fi network, which must be eliminated to avoid problems with our broadband connection.

In this sense, a tool that provides very good results In this regard it is Zamzon Wireless Network Tool which has the particularity of being really simple and at the same time very effective.

Basically, Zamzon has the same function as the mentioned AirSnare, but it does not have all the options that this program includes, that is to say that tasks such as sending messages or event log have not been included, which is definitely not the primary objective for which we installed the program.

 hack-wifi- (20)

However, it should be noted that AirSnare is much more complete than Zamzon, since it also includes a series of really useful, like the emission of warnings with sound every time it discovers an unknown IP address connecting to the network.

Also we can detect the presence of unauthorized users to our network through the panel control of our router.

Once we have confirmed the presence of unauthorized users in our private Wi-Fi network, we must then consider the need to maximize its security system.

Techniques to prevent intruders on the Wi-Fi network

Have we detected an intruder on our Wi-Fi network? Not to despair, since we can put into practice a series of security measures to prevent him from entering again. We have already seen that there are various ways to protect our wireless Internet connection, many of which are useless measures, given that there is also a group of tools developed to generate vulnerability in Wi-Fi networks. Fi.

However, there are also a number of methods that offer good results in this regard, and which are usually Recommended for those who have detected the entry of intruders into their private Wi-Fi network, or to prevent this from happening.

Here we tell you what they are the security measures that work and allow us to protect our Internet connection:

a) Change the router password

We barely found that a user Unauthorized Aryan is taking advantage of our wireless connection, the first thing we should do is change the password of the router . In this way, if for example the intruder tries to download material through a P2P application using our connection, he will not be able to do so, since he will not know the password that the router will request to carry out this task.

b) WPA / WPA2 encryption

In principle, it should be noted that WPA encryption technology , which is fully compatible with higher 802.11g adapters, is stronger and more secure than WEP encryption . In this sense, the most robust is usually WPA2-AES, which has a wide variety of current router models.

c) Anti-WiFi paint

Although it is not yet available worldwide, the truth is that in some countries the new anti-WiFi paint, manufactured by the Pilkington company, has been tested, which so far has provided very good results. .

Useless security measures on Wi-Fi networks

To protect our home Wi-Fi network from intrusion from potential users Unauthorized, there are a series of measures that we can put into practice, although it is important to know which ones offer good results and which are useless.

Once we have verified that there is an intruder on our Wi-Fi network, Fi it will be necessary for us to start using a series of methods that will prevent this from happening, and even more and more unauthorized users taking advantage of our connection.

Although there are various security techniques to avoid being harmed, the truth is that many of them do not provide the expected result, so our Wi-F network i will continue to be vulnerable.

Here are some details about security methods that are useless when protecting access to the wireless network:

a) Turning off the router

When detecting the presence of an intruder, many users resort to the simplest measure, turning off the router. Although it is true that through a router that is turned off it is impossible for intruders to leak into our network, it is also true that we cannot use it either, and when you turn it on again intruders will access to the connection without problems.

[b)WEPencryption This is a measure that has become obsolete, since most users are familiar with applications such as Aircrack, which consists of a tool that allows you to find WEP keys quickly.

c) MAC Filtering

As with the previous case, there are special applications, such as the case of MacMakeUpro, whose function is to change the address of the device in seconds, and which in many cases it causes the owner of the network to be left out of it.

d) Hiding the SSID

This is the method of hiding the name of the wireless network, which is useless, since in any case those looking for a free Internet connection tis through Wi-Fi will detect us the same.

Leave a Reply

Your email address will not be published. Required fields are marked *