The "hacker" in this article is enclosed in quotation marks and suspected to be a title party. I think this behavior is not a hacker. hackers are willing to explore and discover geek, know it then hack it !.
This article also reminds you of this. When you find a Wireless AP without a password, be careful not to log on to the account.
I read an article todayArticleThe UC official team also responded to the "UC browser user password specified for text transmission". In fact, I agree with the official UC saying that when you use public Wi-Fi without a password, is not safe.
UC official response said that the article was also installed for testing, saying "the situation referred to in the article cannot be reproduced at all"
I also tested it and found that it was indeed impossible to reproduce it. But can we use only the devices in our hands to forge WiFi?
I have explored (original ideas, not the methods described in the above article ):
Device:
Two wireless routers
One computer (including two NICs, one wireless and the other wired)
Additional conditions:
Make sure there is no power outage at home due to overdue payment
Accessible network
A computer used for "fish" testing, or mobile devices that support WiFi
We 'd better have an ergonomic chair.
Environment:
Windows Server 2008 R2 x64
Device connection status:
Wireless Router A is connected to the telecom network to provide wireless network services (which is the same as that of ordinary users)
The WLAN port of the wireless router B is connected to a network cable and connected to the wired network port of the windows2008 computer.
The wireless network card of Windows is connected to the wireless router A and enters the network.
IP Address Allocation status:
Wireless Router A (total gateway ):
Dialing type: ADSL dialing, pppoe, etc...
IP Address: 192.168.1.1
Gateway: the gateway address provided by the telecom service provider.
IP address segment: 192.168.1.2-192.168.1.254
Wireless Router B (phishing gateway ):
Dialing type: static IP
IP Address: 192.168.1.9
Gateway: 192.168.1.1
IP address segment: 192.168.9.100-192.168.9.200
Wireless Security Configuration:
Encryption Method: WEP (better compatibility, some mobile phones only support WEP)
SSID: Silence
Key (wireless password): None
After the above connection configuration, please raise wireless router B in the left hand to direct the antenna to the object you want to catch. if the object is too far away from you, you can use the toe to hold the wireless router antenna, head orientation object, maintain posture, do not move.
Enable the wireless network connection attribute of windows and change to "share" to ensureNot Enabled"Internet Connection Sharing ".
Select "wired network" and "wireless network", right-click "bridge"
After bridging:
Install Wireshark (may need to be restarted)
Start Wireshark
Next, use a fish (my mobile phone) to connect to the wireless router B. Because no password is set, the connection is directly connected:
We can see that it is indeed connected to the wireless router B:
Then I accessed google.com.hk on my mobile phone and ran Wireshark on windows2008 to monitor all the processes:
Domain Name, DNS query, HTTP request information, and HTTP response information. For normal HTTP access, we can obtain the access content completely.
If QQ exists, the transmission information of the "OICQ" protocol is displayed.
Then I opened Google on my mobile phone and searched 333333
The entire process is also recorded by Windows:
The entire process is clear and no details are missed:
:
The methods described in this article are only used for technical research and learning. Do not use them for malicious purposes. (I don't think there will be anyone so idle or idle)
This article is intended for more people to know and be careful not to be fooled!
After reading this article,Do you dare to tamper with the Internet at will? (If you do not speak, it is the default, and you will not miss the Internet again)