Cracking a Wireless Network (Video)

P

Plexx

RE: How To Hack Protected Wireless Passwords Win7

Isnt this against rules of forum?

I can understand from a educational point of view but...
 

bogdan

Level 1
Jan 7, 2011
1,362
RE: Hacking a WEP Wireless Network (Video)

Thread moved from Guides to "Other Security Related Discussions" since we don't want to provide a guide for people looking to crack into their neighbors wireless networks.

The video demonstrates that a wireless network that uses WEP and a poor password is highly insecure. WEP (Wired Equivalent Privacy) is flawed by design and easily cracked, as the video demonstrates. Use WPA or WPA2 with a strong pass-phrase to encrypt your wireless network.
 

McLovin

Level 78
Verified
Honorary Member
Malware Hunter
Apr 17, 2011
9,228
RE: Cracking a WEP Wireless Network (Video)

Well we were learning about backtrack in TAFE a while ago and that was about hacking Wireless. We were talking all about WEP, WPA and WPA2
 

bogdan

Level 1
Jan 7, 2011
1,362
RE: Cracking a WEP Wireless Network (Video)

Also WPS (Wi-Fi Protected Setup: is a computing standard that attempts to allow easy establishment of a secure wireless home network.) is susceptible to brute-force attacks even if you use WPA/WPA2 for encryption. If your router support WPS it is recommended to disable it and configure your network yourself and update the firmware on your router (or use DD-WRT alternative router firmware if your router supports it and you have necessary knowledge.). WPS is actually a bad implementation of otherwise good encryption algorithms. (Read more)

lifehacker made a blog post and a youtube video about Reaver, a linux tool used to crack WPS.



Video Source: lifehacker.
 
Last edited by a moderator:

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top