Tricky in WiFi
At this moment, as you read my article, Wi-Fi signals go around in your body like a movie Soul. These signals are distributed in certain frequency bands, encrypted transmission of signals. Except for the "faradha Cage", there is nothing to prevent these signals from spreading. The power only affects the signal transmission distance.
You put all your privacy to this damn router, router manufacturers from the design of the security, the world's known router vulnerabilities can be found here: http://routerpwn.comThere are still many unknown vulnerabilities that are circulating underground and unmined. In the eyes of many hackers, privacy is already a fatigue.
But in my eyes, if I have such private big data, I can definitely find exciting information from it. How important is my big data analysis capability. From here, just shake something out, it is possible to become the focus of the day, watching a lot of busy, really do a good job of Security few people.
The cost of security solutions is so high that it is not possible, but it is a reality.
Next, I will give you a few dishes.
Chameleon Virus
Recently, hackers have developed a new type of router virus, which is spread over wifi. In essence, the firmware of the router is infected (the firmware of the router is like the operating system of the computer). In this way, the whole router is "poisoned", which is worse than computer viruses, poisoned routers attempt to infect these routers through the Wi-Fi signal of nearby routers.
In addition, once a user's terminal (computer or mobile phone) is connected to such a router, a specific "terminal virus" may be implanted. When the user accesses another router, this "terminal virus" will continue to try to infect this router. This process is actually a stepping stone for the user's terminal.
As a result, this constantly infected, more and more router viruses, more and more WiFi fell ......
This virus is called a chameleon. This chameleon is not released, but I guess this idea will soon become popular.
Routers are becoming more and more intelligent. Baidu, Xiaomi, Xunlei, and 360 all have their own smart routers. The more functions there are, the wider the attack surface and the greater the possibility of router poisoning, you must be safe without making a security router.
Predicted buzzwords that will appear in 2014:Router poisoning.
Wireless cracking
The above chameleon virus actually performed a wireless cracking during the router infection process.
We all know that a lot of Wi-Fi access requires a password. There are several authentication methods for WiFi. it is very popular to study Wi-Fi cracking in china around, related tools and techniques have been provided for various types of authentication cracking. I have also followed up on such hacking since then.
If the target Wi-Fi signal is good and there is no need for a high-power antenna, you can directly crack it using related tools. If the signal is not good, you can buy a high-power antenna (Network Anti-bot) it is also a super simple task. You will install the system, and you will be able to learn how to get rid of the network. This kind of tutorial has been a dumb to the extreme ......
Of course, many users still don't understand it. Even if they are occasionally notified that WiFi is not secure, they don't even care. This is normal. Therefore, it is too easy for hackers to engage in these users, and the rest depends on the hacker's practices.
We must have exercises ......
I recently learned that chuangyu's security research team has made a demo. The starting point is goodwill. Of course there are disputes. What do you think is a good thing? If you want to see this demo, you can click "hacker stories: what have I done after attacking the girl router next door". Please take a look with sunshine.
What are the consequences of hacking into this network? I have answered one question for your reference:
In this case, it is easier for you to get hacked.
ARP: sniffers your network traffic and has your various types of privacy. You may already be able to hack your account on the Internet, many hackers have experienced this kind of hacking.
You may not be able to intrude into your computer directly, but access your computer indirectly by tampering with HTTP Response content, replacing downloaded files, and so on.
For example, if you have services such as Baidu online storage, and you know your Baidu online storage account, replace the software with a backdoor, then wait for you to complete the installation ......
Also, you can say that the route password is the default one. Well, in some routes, you can directly capture all kinds of traffic, and then the professional package analysis tools will be available after analysis.
Or try again, modify the DNS record, and then capture packets.
Honeypot Router
The wireless routers we connect to are generally called APs. Sometimes you may find a free ap that can be directly connected. This AP may be a honeypot 」!
When I was a child, my mother told us, "Don't eat cool sugar !」
Now I have to tell you, "Don't connect to a strange AP !」 How do you know if this AP has a "ghost"? Maybe it has been listened to by hackers early. If you connect to this AP, it is like falling into the "honeypot" (slowly dying in happiness ......). We have to be very careful with the AP in the following areas:
Coffee shops/bars are generally used by people with emotional sentiments;
At the airport, generally important people will come here;
The better the hotel, the more cautious the hotel;
The schools are simple, but many hackers are emerging in the student age;
Do not naively think that the Wi-Fi you have prepared for these places is okay. Even if the local owner does not listen to you, hackers who pass by will listen to you. You must know that this kind of listening is unintentional ......
In the above-mentioned "wireless cracking", if a hacker loses his/her hand and fails to crack it, the hacker can deploy a "honeypot" wherever you are used 」, wait for you to hook up.
When I saw this, I heard someone say, "Don't worry, I won't connect to a strange AP !」 I am sorry: hackers have a way to accidentally connect you to a strange AP.
Pay more attention to exceptions to ensure security ......
Black
As a hacker or a technical house, what if your network is hacked?
You can:
The vro wpa2 is encrypted (the password is more complex) and the Mac whitelist is set. Mac is the unique identifier of the terminal (computer or mobile phone). a whitelist is set to allow only trusted terminals to join. This is much safer.
Well, if you are a real technology house, you can click on the router firmware to control it. Once an illegal Mac access is found, you can capture packets and collect evidence from this terminal, it's like you have rubbed his network. How does he engage you? How do you get it back in the same way ...... This is what we call black 」.
How about these dishes? Are you ready?
No. Today's dishes are related to wifi. Among the many ways that hackers have hacked routers, WiFi is just one of them ...... I don't have to go into details. You can refer to "directory-thinking-zhihu column" and find 「Privacy> vro", The articles I posted in history are enough for you.
After reading this article, WiFi still shuttles like "movie Soul". How do you know there is no such thing? Looking back, maybe hackers smile behind you ......
Tricky in WiFi