Mo's network: how hackers forge wifi to catch you (Windows platform)

Source: Internet
Author: User

The "hacker" in this article is enclosed in quotation marks and suspected to be a title party. I think this behavior is not a hacker. hackers are willing to explore and discover geek, know it then hack it !.

This article also reminds you of this. When you find a Wireless AP without a password, be careful not to log on to the account.

 

I read an article todayArticleThe UC official team also responded to the "UC browser user password specified for text transmission". In fact, I agree with the official UC saying that when you use public Wi-Fi without a password, is not safe.

UC official response said that the article was also installed for testing, saying "the situation referred to in the article cannot be reproduced at all"

I also tested it and found that it was indeed impossible to reproduce it. But can we use only the devices in our hands to forge WiFi?

I have explored (original ideas, not the methods described in the above article ):

 

Device:

Two wireless routers

One computer (including two NICs, one wireless and the other wired)

Additional conditions:

Make sure there is no power outage at home due to overdue payment

Accessible network

A computer used for "fish" testing, or mobile devices that support WiFi

We 'd better have an ergonomic chair.

Environment:

Windows Server 2008 R2 x64

 

Device connection status:

Wireless Router A is connected to the telecom network to provide wireless network services (which is the same as that of ordinary users)

The WLAN port of the wireless router B is connected to a network cable and connected to the wired network port of the windows2008 computer.

The wireless network card of Windows is connected to the wireless router A and enters the network.

 

IP Address Allocation status:

Wireless Router A (total gateway ):

Dialing type: ADSL dialing, pppoe, etc...

IP Address: 192.168.1.1

Gateway: the gateway address provided by the telecom service provider.

IP address segment: 192.168.1.2-192.168.1.254

Wireless Router B (phishing gateway ):

Dialing type: static IP

IP Address: 192.168.1.9

Gateway: 192.168.1.1

IP address segment: 192.168.9.100-192.168.9.200

Wireless Security Configuration:

Encryption Method: WEP (better compatibility, some mobile phones only support WEP)

SSID: Silence

Key (wireless password): None

 

After the above connection configuration, please raise wireless router B in the left hand to direct the antenna to the object you want to catch. if the object is too far away from you, you can use the toe to hold the wireless router antenna, head orientation object, maintain posture, do not move.

 

Enable the wireless network connection attribute of windows and change to "share" to ensureNot Enabled"Internet Connection Sharing ".

 

Select "wired network" and "wireless network", right-click "bridge"

 

After bridging:

 

Install Wireshark (may need to be restarted)

Start Wireshark

 

Next, use a fish (my mobile phone) to connect to the wireless router B. Because no password is set, the connection is directly connected:

We can see that it is indeed connected to the wireless router B:

Then I accessed google.com.hk on my mobile phone and ran Wireshark on windows2008 to monitor all the processes:

Domain Name, DNS query, HTTP request information, and HTTP response information. For normal HTTP access, we can obtain the access content completely.

If QQ exists, the transmission information of the "OICQ" protocol is displayed.

 

Then I opened Google on my mobile phone and searched 333333

 

The entire process is also recorded by Windows:

The entire process is clear and no details are missed:

 

:

 

 

The methods described in this article are only used for technical research and learning. Do not use them for malicious purposes. (I don't think there will be anyone so idle or idle)

This article is intended for more people to know and be careful not to be fooled!

 

After reading this article,Do you dare to tamper with the Internet at will? (If you do not speak, it is the default, and you will not miss the Internet again) 

 

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.