Application viewpoint: Practical application of wireless routers

Source: Internet
Author: User

With the development of China's routing industry, the application of wireless routers is also more extensive, so I have studied the practical application of wireless routers, here I will share with you, I hope to be useful to you. My old friend xiaohou successfully ranked among the "white-collar" after graduation. This public network is like life, and soon I bought a kind.

Whether at home, at work, or at Starbucks, he always takes the time to open his laptop and find wireless hotspots. Today we are connected to a wireless router next door neighbor, and tomorrow we will find another coffee house with no money to access the Internet. I kindly remind him to pay attention to information security, but he is always "Jealous ". Not long ago, he suddenly found that his game account and QQ number were all stolen, and Mo Mingyi was installed with a bunch of Trojans in the system. To help him retrieve his account and reinstall the system, I spent the whole weekend. I decided to tell you about this experience and would like to remind you that unencrypted free wireless hotspots may have hidden risks. You must be careful when surfing the internet!

Using Wireless Hotspot Internet access is actually a way to access the Internet through a LAN. We do not need to dial or establish remote peer network, and the specific operations of communication with the Internet are pre-configured by the manager of the wireless router. The only special feature of wireless Internet access is that radio waves are used to transmit information between a computer and a wireless router without passing through a network cable. However, for the entire network, there is no difference in the star topology formed between the wireless router and the client. In other words, hacker tools that can be used within a common LAN can also be used in a wireless LAN.

Common Wireless LAN topology

Let us assume that we are a poor hacker trying to intrude into others' computers through wireless connection. What should we do? First, we will prepare packet capture tools such as Sniffer and supervisor on the computer, and then connect ourselves to an unencrypted network provided by the wireless router. Enable the packet capture tool. The packets sent by other computers on the Internet will be intercepted soon.

Packet capture may be easily discovered by network administrators. hackers who are really powerful often use wireless network cards to build their own wireless networks to Hook Fish. Most wireless network cards support shared wireless connections and work in "ad-hoc" peer connection mode. After enabling the peering mode, hackers can set an SSID for wireless broadcast. In order to make careless users easy to hook up, Hackers often prepare a tempting SSID. If the SSID of a wireless router is "Cafe", the SSID of a hacker's wireless network adapter may be "Cafe2" or even "CafeVIP ". Once the victim's laptop is connected to a hacker's wireless network card, it is easier and more concealed to capture packets or remotely control the victim's computer through vulnerabilities.

Considerations for connecting public wireless hotspots

After the previous steps, we can determine that the wireless access point we want to connect is a legitimate public wireless hotspot. As we mentioned earlier, this open shared network is still not absolutely secure. We also need to do the following to prevent risks: many friends did not set a password for the default Administrator "Administrator" when installing the system. This mistake is what hackers like most. After restarting the computer, enter the security mode. The "Administrator" user will appear on the welcome page. Use it to log on to the system and reset a password. This error is blocked.

Enabling the built-in firewall will slow the computer's Internet access speed, but it is necessary to sacrifice the speed. After enabling the firewall, you can disable "file and printer sharing in Microsoft Network" on the "wireless network connection" Properties tab and disable all incoming and outgoing ICMP requests. You can also click the "run" button in the Start Menu, enter "CMD" to open the Command Prompt window, and then enter "net config server/hidden: yes" in the window ". In this way, other computers connected to this wireless router can neither find your computer through the network neighbor nor use the PING tool.

As the book titled "Two Cities" tells us, "this is the best time and this is the worst time ". This is also true for wireless surfing. As long as we carefully and step by step take measures to protect ourselves, we will be able to make no use of hacker tricks. If you have any tips, you are welcome to leave a message after the text.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.