Pages

Photobucket

How to get to know the Hacking Wireless/WiFi/Hotspot and Trick

Wi-Fi (Wireless Fidelity)


Wi-Fi (Wireless Fidelity) is a wireless connection such as mobile phones using radiotechnology so that users can transfer data quickly. Wi-Fi not only allows you to access the Internet, Wi-Fi can also be used to create wireless networks in the enterprise.Because of that many people associate with Wi-Fi "Freedom" for Wi-Fi technologygives freedom to the wearer to access the Internet or transferring data from themeeting room, hotel rooms, campuses, and cafes are marked "Wi-Fi Hot Spot."




Wi-Fi was originally intended for the use of wireless devices and Local Area Network(LAN), but now more widely used to access the Internet. This allows anyone with a computer with a wireless card (wireless card) or personal digital assistants (PDAs) toconnect to the internet using access point (otherwise known as hotspots) nearby.


specification:
Wi-Fi was designed based on the IEEE 802.11 specification. Today there are fourvariations of 802.11, namely: 802.11a, 802.11b, 802.11g, and 802.11n. B is the first product specifications Wi-Fi. Variation gdan n is one product that has the most salesin 2005.



specification    
Speed              band        compatible
                                     frequncy        with
802.11b               11 Mb/s2.4 GHz    B
802.11a54 Mb/s5 GHzA
802.11g54 Mb/s2.4 GHzb, g
802.11n100 Mb/s2.4 GHzb, g, n



Advantages of Wi-Fi
The high public interest, particularly among the community of Internet-using Wi-Fi technology because at least two factors.
  1. Ease of access. That is, users in one area can access the Internet simultaneously without the need to be bothered with cables.Us
  2. ers who want to do surfing or browsing news and information on the Internet, simply bring the PDA (pocket digital assistance) or Wi-Fi enabled laptop into a place where there is access point or hotspot.
The proliferation of hotspots in places such-built by the telecom operators, Internet service providers and even individuals-triggered second factor, namely due to construction costs are relatively cheap or just around 300 dollars U.S.. Also one of the advantages of Wi-Fi is a speed several times faster than the fastest cable modem.Wi-Fi so users no longer have to be in the office space to work.
Wi-Fi Hardware
Wi-fi hardware on the market currently exists in the form
Wi-fi in the form of a PCI Wi-fi in the form of a USB


There are 2 modes of Wi-fi access, there is:
  • Ad-Hoc: This connection mode is a mode where multiple computers are connected directly, or better known as Peer-to-Peer. The advantage, cheaper and more practical when connected only 2 or 3 computers, without having to buy an access point.
  • Infrastructure: Using the Access Point that serves as a regulator of the data traffic, allowing many clients can connect to each other via a network (Network).
Weakness on wifi/ hacking Wifi


Easily hacking by hacker to steal user passwords wi-fi


The way is as follows:
First we must know the difference between network Hub and Switch:
  • On the network hub of all data flowing on the network can be viewed / picked up by any computer on the network computer asalakan is requesting such data, if not requested it will not come.
  • On the network switch only computers that perform data exchange that can see the data, others are not entitled to komputer2 requesting the data.
The problem is the price of routers hubs and switches do not differ much so that most places are now using the switches that make it difficult for network hacking.
Hacking is using technique:
* Sniffing
* ARP Poison Routing
These two techniques above will not be prevented by any firewall on the victim's computer, guaranteed.
Important Note: ARP Poison Routing can cause denial of service (dos) on one / all of the computers on your network


Pros:
  • It will not be detected by the firewall types and any series because of its weakness lies in not on the computer network system
  • You can steal all kinds of login password via the HTTP server
  • You can steal all those login passwords on the network hub for the program is activated
  • For the ARP Poisoning can be used to steal passwords in HTTPS
  • All programs free
  • To network switch must be in the ARP poisoning one by one and your bandwidth will be consumed much for it (if the inet super fast do not matter)
  • Caught / not by the network administrator outside of my responsibilities
Start from here assume that the network in this story there are 3 computers, namely:
* Computer Victims
* Computer Hacker
* Servers


The first steps:
  1. Check the type of network, you are in a network switch / hub. If you are on a network hub thankful because the process of hacking you will be much easier.
  2. Download the required programs of Wireshark and Cain & Abel.Code:

or
Free download Mirror: wireshark 1.6.0.exe
                                    Cain & Abel.Code


How to use Wireshark and Cain & Abel
The first steps:
1. Check the type of network, you are in a network switch / hub. If you are on a network hub thankful because the process of hacking you will be much easier.
2. Download the required programs of Wireshark and Cain & Abel.Code:
http://www.wireshark.org/download.html
http://www.oxid.it/cain.html


How to use Wireshark:
  • Run the program wireshark
  • Press Ctrl + k (capture and then click option)
  • Make sure the contents of the interface is an Ethernet Card you are headed to the network, if not replace and make sure also that the "Capture packets in promiscuous mode" on
  • Click the Start button
  • Click the stop button after you are convinced that a password is entered while you pressing the start button
  • You can see all types of incoming and outgoing packets on the network (or on your computer only if your network is using a swtich
  • To analyze data right click on the analysis of the data you want and click "Follow TCP Stream" and congratulations to analyze the package (I will not explain how because I can not)
  • What is clear from the data that must be contained within information entered the victim to the website and vice versa. Way above applies only if your network is a hub not a switchFrom the above you can know that your network is a hub / switch by looking at the column IP Source and IP Destination. If at each line one of them is your ip then certainly your network is a network switch, otherwise it means the opposite.


How to Use Cain & Abel:
  • The use of the program is much easier and simple than using wireshark, but if you want all packets that have been in and out is recommended that you use wireshark program
  • Open the program you Cain
  • Click on the Configure
  • In the "Sniffer" select the ethernet card you'll use* In the "HTTP Fields" you must add the fields username and password fields when you want it not on the list.As an example I'll let you know that if you want to hack Friendster password you have to add in the username fields and fields passworsd word name, for others you can find it by pressing the right click view source and you should seek the input variables from the website login and password. Already in default rasanyan already quite complete, you can steal a pass in klubmentari without adding anything.
  • After that apply and click ok.
  • On the main menu there are 8 tabs, and which will be discussed only one tab is the tab "Sniffer" Therefore, select the tab and do not move of the tab to prevent your own confusion
  • Activate the Sniffer sniffer by clicking the button at the top tab it, find the button that his "Start / Stop Sniffer"
  • If you are on the network hub at this time you already know the password is entered by clicking the tab (This time the tab at the bottom instead of in the middle, the middle is no need to click-click again) "Passwords"* You can just choose a password from the connection where you want to see will already be listed there
  • If you turned on the switch network, this requires more struggle, you must activate the APR which is on the right tombolonya Sniffer (And this is not guaranteed to succeed because the manage of the switch is much more comprehensive & secure from the hub)
  • Before activated at the bottom of the sniffer tab select APR
  • It will be seen 2 pieces that are still empty list, click an empty part of the list then click the "+" (It looks like it) in the ranks of the sniffer APR etc.
  • There will be 2 pieces of field containing all the hosts on your network
  • Connect the victim's ip address and gateway ip address of the server (to find out the address of the gateway server on the comp you click start select run type cmd then type ipconfig at the command prompt)
  • After that activate the APR, and all the data from komp victim to a server you can see in the same way.
You can run two programs simultaneously on top (for APR Cain and wireshark for packet sniffing) if you want maximum results.
Passwords can be stolen is the password in HTTP server (the server that is not encrypted), if such information is encrypted on the server then you have to decrypt the data before obtaining the password (and it will require a much longer langkah2 of the way this hack )
For terms that do not understand can be found on wikipedia (but the english ya kalo indo jg not necessarily exist).
Technologically-frequency channels both 2.4 GHz and 5 GHz, which became operational container Wi-Fi technology is not free from limitations.
Because the users in a new area can take advantage of wireless Internet system is optimally, when all the devices used in the area using a uniform transmit power and limited.
If these preconditions are not heeded, will certainly take place harmful interference between devices is not just Internet users, but also with other telecommunications systems devices.
If the interference continues, because users want more superior than other users, and hence a lack of understanding of the limitations of the technology-will ultimately make the frequency bands 2.4 GHz and 5 GHz could not be utilized optimally.
Another limitation of the second wireless frequency channels (particularly 2.4 GHz) is because it is also used for ISM (industrial, science and medical).
Consequently, the use of radio communications or other telecommunication device that works on the frequency band it should be ready to accept interference from ISM devices, as stated in S5.150 of the Radio Regulations.
In ITU-R recommendation SM.1056, also informed the ISM device characteristics which basically aims to prevent interference, both between the ISM and other woods with a telecommunications device.
The same recommendation affirms that every member of the ITU-free set of administrative requirements and rules of law relating to mandatory power restrictions.
Recognizing the limitations and the impact that may arise from the use of both the wireless frequency bands, different countries and impose regulations that limit the transmit power of the devices used.
Wireless Signal
Wireless LAN signals can be captured normally in the range of about 200 meters from the access point, but the client that uses an external antenna can pick up signals as far as 1000 meters. If you put AP near door or window, you can bet the neighbors can come to enjoy Internet access or sniffing network traffic.


If the wireless LAN infrastructure that involves wireless connections between tall buildings, then the client is not desirable could be sniffing from the bottom as far as 2,500 feet (762 meters). So even though the ISP's wireless LAN signal to be placed in the tops of tall buildings can be in-sniffing from below (known as the war flying).
If you want to connect to the internet using wifi while you are away from the AP or wifi is available you can get closer to these areas and can play unlimited internet with the following steps
1) You must have a USB Wireless Adapter. You can get a computer shop in stores with prices ranging from $21 (quite cheap for this sophisticated technology) + UHF antenna parabolic shape.
2) This step is a key step, namely by using UHV-shaped antenna as Grid Parabolic Reflector to amplify the signal.
3) To further strengthen the power of parabole Reflexy you can add wire netting on all surfaces, lalujangan forget screwing with the order parabola. You can also add aluminum foil.
4) Install USB WiFi Adapter on a pedestal in the middle of a parabola. If too long of focus can be cut.
Try to keep a USB WiFI located at the focus of the parabola. Remember the focus of the parabola formula. When in doubt ya simple formula.
F = D (squared) / 4 (squares). C
D: diameter parabolic
C: deep dish
5) attach the USB cable (USB 2.0 High Speed ​​cable system) in such a way.
6) Then reinstall the USB wifi support poles on the parabola. Plug in the iron pipe to facilitate antenne rotated around so tasty.
7) If you've installed the USB drivers had WiFI (factory default).
Then install the "Network Stumbler" to find a strong signal and the closest.


Connect the outside antenna and insert the USB cable to the port of your computer.Scan pake Net Stumbler. Find a network that guns' in the ENCRYPT and away the most deket with you. Then just join.
Access to wifi:
type:
secure, it means to be able to access we have to enter a password
unsecure, meaning we can access the wifi without having to fill in passwords, jd direct connect.
An unsecure, sometimes can not access the internet although it can connect to the network. This is because there is an IP setting. For servers that use dynamic ip, then we do not have to bother with the ip as ip sdh automatically inserted by the server to the client (our computer).
For servers that use a static ip, then we have to manually enter the ip for the computer / laptop we.
If we can connect to wifi tp can not access the internet, try to change the ip of our laptop. How:
Right-click the wifi icon in the bottom right of the screen
select properties
select Advanced
on the connection select Internet Protocol (TCP / IP)
select static ip
the contents ip: 192.168.0.212
content on the Net Mask: 255.255.255.0
on getway contents: 192.168.0.1
on the content server dns: 192.168.0.1
click ok.

6 comments:

  1. Thanks a lot for sharing this nice post!You’ve done really excellent job!

    ReplyDelete
  2. u're welcome.
    I'll share the best so keep stay on my blog. Thanks

    ReplyDelete
  3. After reading your article I was amazed. I know that you explain it very well. And I hope that other readers will also experience how I feel after reading your article. Vapt services

    ReplyDelete
  4. What is an outstanding post! “I’ll be back” (to read more of your content). Thanks for the nudge! гидра онион

    ReplyDelete
  5. Thanks For sharing this Superb article.I use this Article to show my assignment in college.it is useful For me Great Work. сайт гидра

    ReplyDelete
  6. Great post, and great website. Thanks for the information! เว็บดูหนัง

    ReplyDelete

leave a comment below!!!
leave a comment and follow me, so i will follow u too. OK