Free Internet!
The Wi-Fi
speed at NASA is almost 2 GB per second. That would enable you to download an
entire movie in a couple of seconds. How cool would that be.
Now hacking
into NASA might not be possible but hacking into your sibling’s Wi-Fi
definitely is. Check out the next video to find out how.
WHAT ARE WIFI SECURITY PROTOCOLS?
Wi-Fi security algorithms have been through many changes and upgrades since the 1990s to become more secure and effective. The wireless security protocols are WEP, WPA, and WPA2, serving the same purpose but being different at the same time.Let’s look
at them in detail so that we better understand ways to crack them.
1. WEP – Wired Equivalent Privacy
1999-2004 standard. Easy to break and hard to configure. Abandoned. WEP was
supposed to offer the same security level as wired networks, however there are
a lot of well-known security issues in WEP, which is also easy to break and
hard to configure.
2. WPA – Wi-Fi Protected Access Was
used as a temporary enhancement for WEP. Easy to break. Configuration: Moderate
One year before WEP was officially abandoned, WPA was formally adopted.
Most modern WPA was formally adopted. Most modern WPA applications use a
pre-shared key (PSK). WPA, just like WEP, after being put through
proof-of-concept and applied public demonstrations turned out to be pretty
vulnerable to intrusion.
3. WPA2 – Wi-Fi Protected Access
version 2
Since 2004. AES encryption.
The most important improvement of WPA2 over WPA was the usage of the
Advanced Encryption Standard (AES). AES is approved by the U.S. government for
encrypting the information classified as top secret, so it must be good enough
to protect home networks.
Let’s now learn how to identify the vulnerabilities in a Wi-Fi network
and how we can successfully exploit them.
WIFI HACKING
Ever been
in the dreaded situation of not having data but need to pass the time by
watching a You Tube video? Past… if you knew how to hack a WIFI you would be
able to watch that video without and data!!
For now,
save some data and watch this video. It will help you understand the exact
procedure of Wi-Fi hacking you can perform. Moreover, the video shows you all
required tools, how to use them to identify a network and hack it.
You can
also play along and input the commands in the Kali LINUX operating system and
access your neighbor’s Wi-Fi router. P.S. you can even see their browsing
history😊.
WPA VS. WWPA-
Both WPA
and WPA2 are supposed to secure wireless Internet networks from unauthorized
access. If you leave your router with no security then anyone can steal the
bandwidth, perform illegal actions out of your connection and name, monitor
your web activity, and easily install malicious apps in your network.
But what is
the main difference between WPA and WPA-2?
Wi-Fi
routers support a variety of security protocols to secure wireless networks:
WEP, WPA
and WPA2. However, WPA2 is recommended over its predecessor WPA (WI-FI
Protected Access).
Probably the only downside of WPA2 is how much processing power it needs to protect your network. This issue concerns older access point that were implemented before WPA2 via a firmware upgrade.
Definitely
use WPA2 if you can and only use WPA if there is no way your access point will support
WPA2. When security is the top priority then rolling back is not an option,
instead one should seriously consider getting better access point. WEP has to
be used if there is no possibility to use any of the WPA standards.
Depending
on what security protocols you use the data speed can be affected. WPA2 is the
fastest of the encryption protocols, while WEP is the slowest.
1. Which among them has the strongest
wireless security?
a. WEP
b. WPA
c. WPA2
d. WPA3
Ans- d. WPA3
2. Which one of the following needs the
most processing power?
a. WPA
b. WPA2
c. WEP
Ans- b. WPA2
KEY TAKEAWAY!
·
The
process of cracking Wi-Fi passwords to gain access to the internet is known as Wi-Fi
hacking.
·
As
explained in the video the hacker uses several tools to help him crack WIFI
passwords.
·
Be
aware that hacking others Wi-Fi should be done at your own risk.
0 Comments