This simple blog gives you the idea to know when to browse free of charge when you come across a wireless network either secure or unsecure there are always ways to crack them if you have the neccessary tools to do them, you can simply reach me. Do you know you can surf the net with your phone absolutely free for more information,call this number +2347057410898 or +2348037244979 for assistance or post your experiences and questions as comments.
Tuesday, January 23, 2007
Wireless Taping
Wireless Taping -theraider As computing technology continues to shift from wired to wireless, wireless ( local-area networks) have boomed in popularity in recent years. But this explosion has sparked a significant increase in wireless snooping and hacking, leading experts to warn consumers of the wireless security pitfalls. Wireless LANS are by far one of the more popular examples of computing convenience. Cahners in-Stat Group estimates the wireless LAN market will grow more than 200% in the next 2 years, from $1.2 billion in 2000 to $4 billion by 2003. But this recent popularity has drawn significant attention in other areas, particularly security. Despite the recent press barrage detailing the ease with which wireless networks can be hacked, these networks remain astonishingly vulnerable. Wireless networks paint a tantalizing picture for crackers, snoops, and even the mildly curious because these individuals can easily equip themselves with a few readily available items, hop in a car, and drive around detecting wireless access points. In fact, this activity has become a favorite pastime of the technology media itself as it continues to prove the frailty of wireless security. CRACKERS : CHOOSE YOUR WEAPON Just as in the wired world, a variety of attacks are used to infiltrate wireless networks. Although some are used alone, others ca be used in tandem to access sensitive data. The following are several examples of popular attacks used against 802.11B based networks. INSERTION ATTACKS: Insertion attacs occur when crackers deploy unauthorized devices in an effort to be recognized by an existing network. For instance, a craker could set up shop outside an access point, armed with a notebook computer or PDA and Wireless Network cards. Because of the required devices' portability, it's simple enough to accomplish these attacks while parked in a car outside a business or home. The access point may or may not be configured for password authentication. If it isnt, the crackers's job is much easier, as it's only necessary to enable communication between the wireless client and the access point. JAMMING As a form of DOS ( denial of service) attacks, DDOS ( distributed denial of service ) rose to popularity in 2000 when websites, such as Yahoo, Amazon, and CNN were crippled by the attacks overwhelming traffic. Crackers also use DOS attacks to flood wireless frequencies to the point where legitimate traffic cant get through. Wireless jamming isnt a new kid on the block. In fact, cell phone jamming equipment can transmit radio signals that block cell phones nearby from accessing and decoding local signals from cellular networks. BRUTE FORCING because most access points share one key or password wiall connecting wireless clients, that key or password is often subjected to brute force attacks. The Brute Force method involves the use of software-based password crackers that try every possible password combination until they succesfully find the correct one. Although this process can be time consuming, it's still effective across wireless and wired networks. Those mentioned are simply a few. If you are interested in learning more on Wireless Hacking/ Taping feel free to email me at anonraider@hotmail.com for further reading. THERAIDER
Subscribe to:
Post Comments (Atom)
WELCOME
Welcome to my world where everybody is somebody and none is nobody. Together we shall hack all hackables
No comments:
Post a Comment