Has your wireless network packet been "borrowed"? (1)

Source: Internet
Author: User

When you browse the online information, you can find that your information has slipped away? Security is currently the top priority. Let's take a look at this article to see how the mysterious cyber hacker "borrowed" your wireless network data packets.

Wireless networks are the most convenient word for everyone, but the same word wireless is a great temptation for hackers, the interception of wireless network data packets from others' computers is more attractive to hackers. In traditional wired networks, wireless network data packets may be obtained only when they are in the same LAN as the hacked computers, when the network can be wireless, the biggest obstacle to hackers will be completely broken, because in the air there will be a chance to catch wireless network packets from others' computers, and then find out valuable information, user names and passwords... And the hacker task can be carried out anytime, anywhere in a wireless network. The most terrible thing is... The hacker has no idea (or can't know) about his or her Internet access information, and the hacker does not have to worry about being caught... Because it is not connected to any network at all, there is no IP address to track!

◆ Data Acquisition Process for wireless network data packets

Select wireless base station-> set listening channel-> start to collect data packets-> analyze data packets to find useful information

◆ Prepare and install the tool
Since it must be cracked in Linux, what should I do if most people use Windows? In fact, all people have thought about it. You can download the USB flash drive or optical drive version of BackTrack3 from the following website, and also include the related cracking tools, which can be easily and conveniently carried out in Linux, it doesn't move to your computer's hard drive or environment.
BackTrack3FinalU Disk
BackTrack3Final Optical Disk

◆ Step 1 select a wireless base station
Use NetworkStumbler (or similar tools) in Windows to find out most wireless
The channel (ch) used by the station or the SSID name and channel (ch) of a specific wireless base station )... And write it down.

◆ Step 2 set up a wireless network device (or card) Listening Channel
Now start Linux with the created BackTrack3U disk or CD, and then:
Use the macchanger command to change the MAC address of a wireless network device.
Use the airmon-ng command to set the channel for the wireless base station to be decrypted by monitoring.
For parameter descriptions of the command column tools in Linux, refer to here.

◆ Step 3 Start intercepting wireless network data packets
Now we can use WireShark in Linux to intercept wireless network data packets and input ip addresses in CaptureFilter. If the wireless base station has WEP/WPA encryption, no input... Then start to wait slowly.
Many types of data packets exist, but most of the valuable data packets are on the IP layer. Therefore, only the IP layer data packets are intercepted. Other types of data packets are not captured, while many basic signal data packets (Boardcast) or a variety of handshake signal packets (AcknowledgePacket), these are not valuable.
Because I don't know how many valuable data packets can be captured, I may get a lot in a short time, or it may take several hours to get nothing or get nothing... These situations are not necessarily determined by luck, but some principles can be mastered. For example, if a wireless base station is located in a residential area, it should be between and ~ Or holiday, if the wireless base station is in the office, select the normal working time, if you want to capture the data packets of a specific wireless base station, select the time the other party is most likely to access the Internet to intercept.


Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.