We often pay attention to how to improve the security of wireless networks and how to set up wireless networks. This article introduces wireless network cards and connection settings.
My old friend xiaohou successfully ranked among the "white-collar" after graduation. This public network is like life, and soon I bought a kind. Whether at home, at work, or at Starbucks, he always takes the time to open his laptop and find wireless hotspots. Today, we are connected to the wireless route of the next-door neighbor, and tomorrow we will find another coffee house with no money to access the Internet. I kindly remind him to pay attention to information security, but he is always "Jealous ". Not long ago, he suddenly found that his game account and QQ number were all stolen, and Mo Mingyi was installed with a bunch of Trojans in the system. To help him retrieve his account and reinstall the system, I spent the whole weekend. I decided to tell you about this experience and would like to remind you that unencrypted free wireless hotspots may have hidden risks. You must be careful when surfing the internet!
Using Wireless Hotspot Internet access is actually a way to access the Internet through a LAN. We do not need to dial or establish remote peer network, and the specific operations of communication with the Internet are pre-configured by the router manager. The only special feature of wireless Internet access is that information is transmitted by radio waves without passing through the network cable between the computer and the route. However, for the entire network, there is no difference between the star topology structure formed between the wireless route and the client. In other words, hacker tools that can be used within a common LAN can also be used in a wireless LAN.
Common Wireless LAN topology
Let us assume that we are a poor hacker trying to intrude into others' computers through wireless connection. What should we do? First, we will prepare packet capture tools such as Sniffer and token on the computer, and then connect ourselves to an unencrypted network provided by the wireless route. Enable the packet capture tool. The packets sent by other computers on the Internet will be intercepted soon.
Packet capture may be easily discovered by network administrators. hackers who are really powerful often use wireless network cards to build their own wireless networks to Hook Fish. Most wireless network cards support shared wireless connections and work in "ad-hoc" peer connection mode. After enabling the peering mode, hackers can set an SSID for wireless broadcast.
Peer-to-peer mode allows computers to connect to the network through other computers
In order to make careless users easy to hook up, Hackers often prepare a tempting SSID. If the SSID of a wireless route is "Cafe", the SSID of a hacker's wireless Nic may be "Cafe2" or even "CafeVIP ". Once the victim's laptop is connected to a hacker's wireless network card, it is easier and more concealed to capture packets or remotely control the victim's computer through vulnerabilities.