Do a Good Job of wireless network security protection information transmitted in the air

Source: Internet
Author: User

When I tried a wireless router at home two days ago, I suddenly found that there were more and more neighbors using wireless networks. However, most users were not encrypted, and the SSID of many machines was not modified, looking at D-Link, mesh, TP-LINK all kinds of brands are everything. Of course, some neighbors still encrypt the network. One of them is the "ji de jia mi" SSID, which impressed me.

There is no doubt about the mobility and flexibility of wireless networks. However, from a security perspective, users' networks also form a broadcast source. Without any security measures, others will easily find and connect to your network. When hackers access the Internet for free, some important information and privacy on your computer will be stolen, and the neighbor's SSID "ji de jia mi" (remember to encrypt) we are also reminding you in good faith. However, objectively speaking, even if encryption measures are adopted, wireless networks are still not absolutely secure. wireless technologies are advancing and intrusion technologies and tools are also being followed up. So how can we effectively protect the spread of data in the air at this stage? In this article, we will introduce some preventive measures to some typical intrusion methods.

Several typical wireless intrusion methods:

Encryption attacks: This is a brute-force cracking method. Currently, encryption attacks are mainly targeted at WEP. Due to the defects of WEP encryption, intruders will use corresponding tools to detect WEP Security protocol vulnerabilities, the attack is then cracked through packet capture analysis and other means. This process can be completed within several hours.

Wireless phishing: similar to the popular online phishing method, hackers first set up a disguised wireless access device on a certain attempt network or in a public location, in this way, the victim may mistakenly assume that there is a wireless network. Especially in public scenarios, when the signal strength of disguised wireless devices is very good, users are most likely to be deceived. At this point, hackers can wait to receive the password entered by the victim, or enter the virus code into the victim's computer. Although this is not a real intrusion, it is better than the "brute force" attack described above and has more serious consequences.

Malicious spoofing: a disguised wireless access device is set up by a hacker. If the victim wants to connect to the server, the fake server will send a response message to connect the victim to a fake server. This method is similar to the aforementioned "phishing attack.

In addition, if your wireless network is fully open, intruders can access the Internet for free, or attack third parties and explore other networks through your network.

Anyone interested in wireless security may know that there are a lot of brute-force cracking tools available now, from detection, listening to final cracking, are we only waiting for threats from these cracking tools as common users? Below I will list several popular cracking tools and methods. I hope you can take corresponding measures to protect them while learning about these tools.

Network Stumbler: A common software used in wireless Network testing. This Windows-based tool can easily discover wireless signals broadcast within a certain range, it can also determine which signals or noise information can be used for site measurement. For many home users, this software can be used to test the optimal placement of wireless routers. for users with bad intentions, Network Stumbler is used as a tool to capture the signal source. Therefore, I suggest that you disable your SSID broadcast when network encryption is enabled.

 

  • 1
  • 2
  • Next Page
[Content navigation]
Page 6: Information on wireless network security protection spreading in the air Page 6: Information on wireless network security protection spreading in the air

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.