Ticker

"WEBSITE UNDER MAINTENANCE"

WIFI HACKING AND HOW THE WIFI HACKING IS DOES:-

 Free Internet!

The Wi-Fi speed at NASA is almost 2 GB per second. That would enable you to download an entire movie in a couple of seconds. How cool would that be.

Now hacking into NASA might not be possible but hacking into your sibling’s Wi-Fi definitely is. Check out the next video to find out how.

WHAT ARE WIFI SECURITY PROTOCOLS?

Wi-Fi security algorithms have been through many changes and upgrades since the 1990s to become more secure and effective. The wireless security protocols are WEP, WPA, and WPA2, serving the same purpose but being different at the same time.

Let’s look at them in detail so that we better understand ways to crack them.

1.      WEP – Wired Equivalent Privacy 1999-2004 standard. Easy to break and hard to configure. Abandoned. WEP was supposed to offer the same security level as wired networks, however there are a lot of well-known security issues in WEP, which is also easy to break and hard to configure.

2.      WPA – Wi-Fi Protected Access Was used as a temporary enhancement for WEP. Easy to break. Configuration: Moderate

One year before WEP was officially abandoned, WPA was formally adopted. Most modern WPA was formally adopted. Most modern WPA applications use a pre-shared key (PSK). WPA, just like WEP, after being put through proof-of-concept and applied public demonstrations turned out to be pretty vulnerable to intrusion.

3.      WPA2 – Wi-Fi Protected Access version 2

Since 2004. AES encryption.

The most important improvement of WPA2 over WPA was the usage of the Advanced Encryption Standard (AES). AES is approved by the U.S. government for encrypting the information classified as top secret, so it must be good enough to protect home networks.

 

Let’s now learn how to identify the vulnerabilities in a Wi-Fi network and how we can successfully exploit them.

WIFI HACKING

Ever been in the dreaded situation of not having data but need to pass the time by watching a You Tube video? Past… if you knew how to hack a WIFI you would be able to watch that video without and data!!

For now, save some data and watch this video. It will help you understand the exact procedure of Wi-Fi hacking you can perform. Moreover, the video shows you all required tools, how to use them to identify a network and hack it.

You can also play along and input the commands in the Kali LINUX operating system and access your neighbor’s Wi-Fi router. P.S. you can even see their browsing history😊.

WPA VS. WWPA-

Both WPA and WPA2 are supposed to secure wireless Internet networks from unauthorized access. If you leave your router with no security then anyone can steal the bandwidth, perform illegal actions out of your connection and name, monitor your web activity, and easily install malicious apps in your network.

But what is the main difference between WPA and WPA-2?

Wi-Fi routers support a variety of security protocols to secure wireless networks:

WEP, WPA and WPA2. However, WPA2 is recommended over its predecessor WPA (WI-FI Protected Access).

Probably the only downside of WPA2 is how much processing power it needs to protect your network. This issue concerns older access point that were implemented before WPA2 via a firmware upgrade.

Definitely use WPA2 if you can and only use WPA if there is no way your access point will support WPA2. When security is the top priority then rolling back is not an option, instead one should seriously consider getting better access point. WEP has to be used if there is no possibility to use any of the WPA standards.

Depending on what security protocols you use the data speed can be affected. WPA2 is the fastest of the encryption protocols, while WEP is the slowest.

1.      Which among them has the strongest wireless security?

a.      WEP

b.      WPA

c.      WPA2

d.      WPA3

Ans- d. WPA3

2.      Which one of the following needs the most processing power?

a.      WPA

b.      WPA2

c.      WEP

Ans- b. WPA2

 

KEY TAKEAWAY!

·        The process of cracking Wi-Fi passwords to gain access to the internet is known as Wi-Fi hacking.

·        As explained in the video the hacker uses several tools to help him crack WIFI passwords.

·        Be aware that hacking others Wi-Fi should be done at your own risk.

 


Post a Comment

0 Comments

Subscribe

We'll send you AWESOME content!