Guide | How To Is Your Router Easy to Hack? Learn How to Properly Secure Your Router

The associated guide may contain user-generated or external content.

Venustus

Level 59
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Dec 30, 2012
4,809
IS-YOUR-ROUTER-EASY-TO-HACK_Header.png

If you’re like most people, you probably don’t give your home WiFi router another thought after checking to make sure it has Internet connection. But did you know that your home WiFi router is a crucial component to your overall security?

While a WiFi router means no more hassling with messy Ethernet cables, you could unknowingly be putting your data at risk of being intercepted if you don’t properly secure it.

When was the last time you checked which WiFi encryption you’re using? Perhaps you’ve been using Wired Equivalent Privacy (WEP) all this time without even knowing! Using WEP as your WiFi encryption is equivalent to using no encryption at all, as this flawed encryption standard can be hacked in a matter of minutes. To better protect your network, you should upgrade to WPA2, a newer and more robust WiFi network security standard. We’ll show you how to check which WiFi encryption you’re currently using and how to upgrade to WPA2.

First, what’s wrong with WEP?
Wired Equivalent Privacy or WEP was introduced in 1999 to provide a WiFi network with security comparable to that of a wired network.

WEP was widely used for years, but before long, it became clear that WEP security was about as strong as a wet paper towel. For example, in 2005, the FBI publicly demonstrated how it could crack WEP passwords within minutes. Once passwords are cracked, a hacker can do just about whatever he wants on your network or to your computer— including stealing your bank account information.

Though WEP was retired as a WiFi network standard in 2004, it’s still in use today, particularly by those with older computers and pre-2005 wireless network routers.

Bottom line: If you haven’t upgraded to WPA2, you should consider doing so right away.

Further Reading

Disclaimer:This is not meant as an advertisment for ZA;)
 

Venustus

Level 59
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Dec 30, 2012
4,809
My router password is 32 characters long, including special characters - it may be over-the-top but we once had someone using our internet :mad:
Same thing happened to me many years ago!:mad:
A great deal wiser now..!;)
 

viktik

Level 25
Verified
Well-known
Sep 17, 2013
1,492
i don't use any password in my router WiFi setup.
Its free for all . Anyone can join in and access the internet.
 
  • Like
Reactions: Venustus

Cats-4_Owners-2

Level 39
Verified
Honorary Member
Top Poster
Well-known
Dec 4, 2013
2,800
i don't use any password in my router WiFi setup.
Its free for all . Anyone can join in and access the internet.
I am quite happy, albeit tardy, to have learned now we are WPA2 secure!:D;)

viktik, on the one hand I admire, and fully appreciate, your generous spirit of sharing (..so very MT!:p) yet, on the other (dark side of the moon) hand, I wonder about security, since I am not one of your lucky neighbors and am living on the outskirts of that sprawling internet veldt known as Los Angeles. I shall have to concoct as impressively bulletproof a 32 character password as @Tony Cole's because "over-the-top" has to be preferable to someone scoring that game winning goal:confused: into our:eek: bank account!!
 
Last edited:

viktik

Level 25
Verified
Well-known
Sep 17, 2013
1,492
All sensitive information should pass through SSL encryption . So even if someone tries to eavesdrop they will see encrypted traffic.
 

noladevildog

Level 1
Verified
Jan 11, 2015
19
Also, don't think that because you use MAC Filtering gives you any layer of good security. It doesn't.

All an attacker has to do is monitor the Wi-Fi traffic for a second or two, examine a packet to find the MAC address of an allowed device, change their device’s MAC address to that allowed MAC address, and connect in that device’s place. You may be thinking that this will not be possible because the device is already connected, but a “deauth” or “deassoc” attack that forcibly disconnects a device from a Wi-Fi network will allow an attacker to reconnect in its place.

More reading.
http://www.howtogeek.com/204458/why-you-shouldn’t-use-mac-address-filtering-on-your-wi-fi-router
 

vivid

Level 5
Verified
Dec 8, 2014
206
As pointed out by openwireless.org,

"WPA2 and other Wi-Fi security schemes protect only against an attacker on your local network, and provide only nominal protection. Very often, "securing" your wireless network will not be enough to thwart a determined attacker on your local network from being able to read and manipulate your data. Therefore, the security loss from moving to an open wireless network is less significant than you might realize, especially if you set up your network to firewall users from each other—as we recommend in our tutorials whenever possible."
"Savvy network operators who are concerned about security can also set up their open networks to use a VPN service, if they have access to such a service or are willing to pay for access."​

You should also note that most or all existing router software have various vulnerabilities (eg cross-site scripting) and lack a secure software auto-update mechanism.
 
Last edited:

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top