Watch out for free wireless risk Wireless Settings

Source: Internet
Author: User

My old friend xiaohou successfully ranked among the "white-collar" after graduation. This public network is like life, and soon I bought a kind. Whether at home, at work, or at Starbucks, he always takes the time to open his laptop and find wireless hotspots. Today, we are connected to the wireless route of the next-door neighbor, and tomorrow we will find another coffee house with no money to access the Internet. I kindly remind him to pay attention to information security, but he is always "Jealous ". Not long ago, he suddenly found that his game account and QQ number were all stolen, and Mo Mingyi was installed with a bunch of Trojans in the system. To help him retrieve his account and reinstall the system, I spent the whole weekend. I decided to tell you about this experience and would like to remind you that unencrypted free wireless hotspots may have hidden risks. You must be careful when surfing the internet!

Using Wireless Hotspot Internet access is actually a way to access the Internet through a LAN. We do not need to dial or establish remote peer network, and the specific operations of communication with the Internet are pre-configured by the router manager. The only special feature of wireless Internet access is that information is transmitted by radio waves without passing through the network cable between the computer and the route. However, for the entire network, there is no difference between the star topology structure formed between the wireless route and the client. In other words, hacker tools that can be used within a common LAN can also be used in a wireless LAN.

Common Wireless LAN topology

Let us assume that we are a poor hacker trying to intrude into others' computers through wireless connection. What should we do? First, we will prepare packet capture tools such as Sniffer and token on the computer, and then connect ourselves to an unencrypted network provided by the wireless route. Enable the packet capture tool. The packets sent by other computers on the Internet will be intercepted soon.

Packet capture may be easily discovered by network administrators. hackers who are really powerful often use wireless network cards to build their own wireless networks to Hook Fish. Most wireless network cards support shared wireless connections and work in "ad-hoc" peer connection mode. After enabling the peering mode, hackers can set an SSID for wireless broadcast.

Peer-to-peer mode allows computers to connect to the network through other computers

In order to make careless users easy to hook up, Hackers often prepare a tempting SSID. If the SSID of a wireless route is "Cafe", the SSID of a hacker's wireless Nic may be "Cafe2" or even "CafeVIP ". Once the victim's laptop is connected to a hacker's wireless network card, it is easier and more concealed to capture packets or remotely control the victim's computer through vulnerabilities.

How to avoid falling into the "AD-HOC" trap

Now let's take a look at how to prevent wireless surfing. Open a notebook and refresh the list of available wireless networks. As shown in, the system tells us that it has found a total of four wireless networks. Note the selected wireless network in the figure. Its icons are different from those of the other three. The wireless network named "Accenture" is "computer-to-computer network" in "AD-HOC" mode ". Please recognize this icon and do not click it in the future.

Multiple wireless connections include one suspicious connection.
Many computers now enable the "Automatic Connection" function by default, some hackers also use this setting to set the SSID of their phishing network to the default SSID of "Netgear", "TP-Link" and other well-known brands of wireless routes. When the computer detects that there is a wireless network with the same SSID as the previously used wireless network), it will automatically establish a connection with the other party. We have no time to manually refresh the available wireless network list. We recommend that you disable the automatic connection function of the wireless network card. Open the Properties tab of "wireless network connection", find the "wireless network configuration" bookmarks, and click "advanced ", in the displayed window, remove the check box before "automatically connect to a non-preferred network.
Modify connection method Interface

The pop-up window also provides three options: "Any available network", "Access Point only", and "computer to computer only ". If you do not have any conditions or want to connect to your friends in AD-HOC mode, you may consider selecting access only.

Considerations for connecting public wireless hotspots

After the previous steps, we can determine that the wireless access point we want to connect is a legitimate public wireless hotspot. As we mentioned earlier, this open shared network is still not absolutely secure. We also need to do the following to prevent risks:

Many of my friends did not set a password for the default Administrator "Administrator" when installing the system. This mistake is what hackers like most. After restarting the computer, enter the security mode. The "Administrator" user will appear on the welcome page. Use it to log on to the system and reset a password. This error is blocked.

Enabling the built-in firewall will slow the computer's Internet access speed, but it is necessary to sacrifice the speed. After enabling the firewall, you can disable "file and printer sharing in Microsoft Network" on the "wireless network connection" Properties tab and disable all incoming and outgoing ICMP requests. You can also click the "run" button in the Start Menu, enter "CMD" to open the Command Prompt window, and then enter "net config server/hidden: yes" in the window ". In this way, other computers connected to this wireless route can neither find your computer through the network neighbor nor use the PING tool.

As the book titled "Two Cities" tells us, "this is the best time and this is the worst time ". This is also true for wireless surfing. As long as we carefully and step by step take measures to protect ourselves, we will be able to make no use of hacker tricks. If you have any tips, you are welcome to leave a message after the text.

Related Articles]

  • Tips for winning wireless Internet Acceleration
  • Avoid mistakes and build a wireless LAN
  • Comparison of several Broadband Wireless Access Technologies

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.