WiFi Hacking Basic Attacks

How To Hack WiFi & Associated Technologies Is A “Must-Know” Ethical Hacking Skill

Posted by Henry Dalziel  |  December 16, 2019  |   Questions / Comments 0

WiFi Hacking Basic Attacks

Cybersecurity Growth Hack Tool network password
Henry Dalziel
Henry Dalziel | December 16, 2019

- C|EH, Security+, MSc Marketing Management;
- Based in Hong Kong for the last five years;
- Cybersecurity Pro & Growth Hacker

Want to crack WiFi networks? Then get to know these wireless hacking tools!

The inspiration of this post owes itself to our newly re-launched Hacking Tools directory which contains a bunch of Wireless Hacking tools and frameworks used by pentesters, ethical hackers and network engineers.

We’ve listed [May 2015] 7 popular wifi hacking tools which are:

Hacking Wireless passwords is not really a difficult hack owing to the multitude of attack vectors that can be deployed. Weak or default passwords are by far the easiest way to get into a router and network. A simple search of YouTube pulls up thousands of videos on the subject, some are better than others but in any event here’s the web’s easiest WiFi hack:

OK, so the world’s easiest WiFi hack is determined whether you have access to the router. If you do then all you need to do is reset it and hit up routerpasswords.com which lists all default password settings.

Often the password will not have been changed so you can likely even try the password in that combo.

That’s it. It’s as easy as that!

This post is aimed at beginners so let’s just confirm some jargon and get that cleared up:

Sniffing/ eavesdropping:
The term indicates that you are passively listening to network data on without the users knowledge by tricking the network into passing all data through the hacker’s computer first (behaving like a gateway).

Man in the middle attack:
This attack, often abbreviated to MITM is used to intercept traffic between a user’s device and the destination system, such as a hotel offering Wi-Fi and makes the victim’s machine think the hacker’s machine is the access point to the Internet.

DNS cache poisoning:
A method of attack whereby “updated” network data is used to enable the hacker to divert the traffic to the hacker’s destination of choice.

Rogue Access Points/Rogue APs:
Wireless access points installed on a company’s network without the company’s knowledge. These access points override the legitimate network thereby allowing the hacker to perform a man in the middle attack and intercept data.

Unsecured Wi-Fi network:
An unsecured Wi-Fi network is a wireless network that doesn’t request the user to log into it via the use of a username and password. These are usually displayed as OPEN networks.

WEP – Wired Equivalent Privacy:
The first wireless security scheme developed, it was designed to provide security that was essentially equivalent to the privacy that was enjoyed in a wired environment. This is the least secure type of wireless network available.

WPA – Used Temporal Key Integrity Protocol (TKIP):
This protocol further improves the security of WEP without the need to buy new hardware. It still uses WEP for encryption, but it makes the attacks used to crack WEP a bit more difficult and time-consuming.

This is the next level up from WPA and was designed for the home and small businesses . As the name implies, the new version uses a pre-shared key (PSK). This has become standard that is now used by most households today.

This is a version of WPA2 used by businesses. It uses the Advanced Encryption Standard, or AES, to encrypt data and is the most secure. It’s often coupled with a RADIUS server that is dedicated for authentication.

RADIUS – Remote Authentication Dial In User Service (RADIUS):
A networking protocol that provides centralised Authentication, Authorisation, and Accounting management for users who connect and use a network service within a business. These users are authenticated against the company systems for added protection.

Wireless networks use Channels which are separated out so that various communication streams don’t interfere with each other. The 802.11 wireless standard allows for channels ranging from 1 thru 14.

Brute-force attack:
A method in which a hacker will try and break the password by continuously attempting to log in with different credentials until they find one that works. It could take hours, days or months depending upon the complexity of the password being used.

Dictionary attack:
A method used to ry and break the password of a user or wireless device by going through all the words in a dictionary, trying each one in turn until it finds a password which works.

Virtual private network (VPN):
A VPN is a way of using the public internet like a secure private network. It encrypts data and routes it through remote servers, keeping the activity and location private and secure.

Leave a Question or Comment:

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Some Of Our Other Content

You may also like...

USB Keyloggers
USB Keyloggers

Some of these USB Keyloggers work over WiFi and others even email you the keystrokes! Require NO drivers. Just plant and forget.

Blog Post

N00b Hacking
WiFi Hacking Hardware Devices
WiFi Hacking Hardware Devices

We take a look at hardware used by the pro's to hack into Wireless Networks! (Keyloggers, Deauth Tools, Alfa Scanner etc.)

Blog Post

WiFi Hacking
Mobile Encryption Apps
Mobile Encryption Apps

Is WhatsApp safe? What about Telegram? There are dozens of mobile encryption apps...

List Review

Cyber Hacking
Password Cracking Tools
Password Cracking Tools

John The Ripper, Crowbar, L0phtcrack, Medusa, Rainbowcrack, THC Hydra and more!

List Review

Cyber Hacking
Kali Linux Developers
Meet The Kali Linux Developers

Meet the folks behind the Hacking Tools that make Kali Linux so damn awesome

Blog Post

N00b Hacking
OSCP Advice
How Difficult is OSCP? Get expert advice from those that passed!

We've interviewed over 25 Cybersecurity Professionals to ask them that exact question...

Blog Post

N00b Hacking
How To Hack WordPress 2020
How To Hack WordPress 2020

In this (constantly updated) resource we investigate ways to Hack WordPress

Blog Post

N00b Hacking
Pass CEH First Time
Pass CEH First Time: we ask experts in the field

Are you interested in passing CEH? If yes, read on, we have a ton of advice to share

Blog Post

N00b Hacking