Wi-Fi Hacking 💀: Penetration and Security of Wireless Networks - Full Tutorial
WsCube Tech
A black hat hacker can steal all your data and how you can be safe from this. so,
let 's see the complete process where we will understand the vulnerabilities of our
wifi and how to correct them. we will learn in complete detail what a wifi is, what
kind of device it is, how it works, what are the its disadvantages and how a hacker
access your data. we will understand the history and security of wifi from
starting. our first wep was wep. the encryption that was being followed in this was
RC4, which is not much strong, but it 's fine. after that, WPa came. after this our
data started going a bit securely. WPa 2 is the technology that is being used
nowadays. Even though some technologies have come ahead of it too. it brought a
very good encryption technique called AeScCmP, which came in. In 2004. it used to
apply encryption according to the bit size of 128 bits. it was very useful because
they could not do cracking until they get exact password.. So here it took a lot of
effort to crack the handshake files. now, we will be using WPa 3, which is its
higher version and even more secure and advanced..
The last point is that it is using key size of 128 bits to 256 bits. hence, it has
become even more secure. along with that, it will use security protocols also.
alongside that, we will find loopholes in these security protocols only. and we
will also see how we can exploit those vulnerabilities. we need to understand this
to apply all the hacking technologies. our router has 3 [UNK] private IP, public Ip
and mac address.. Mac address is a hardware address which never changes. the last
and final identity that never changes is its media access control address. our
router can give any IP to any system from the Ips after 192. 168. 1. 0 and before
255. 255. 255255255.. It can give these identity IPs. our broadband has a very good
service or a protocol, which is called ArP. ArP is a protocol that will find out.
What address is allotted to you. it will share data of ArP packets through radio
signals which will ask every system what IP it has.. The next IP is 192. 168. 0. 2
which it allots to this system. then it will keep on allotting some IPs to every
system..
There is one of the biggest flaws in our Android devices and in many systems. this
system asks only 1 thing to get connected to this wifi and that is the essid.. This
is a flaw which means that it does n't match the mac address first. it directly
does the data transfer according to that name, which is a very big flaw. there is
work going on to correct This flaw. dos attack or denialofservice attack is called
denial of service attack.. In this attack, an attacker sends so much data to a
victim system for processing that the victim system is hanging and it is hanging.
as a result,, it will crash or automatically shut down or it will shut down.. This
same thing happens in our wifi. deauthentication flood attack means we are
disconnecting someone. deauthentication flood is a part of dos and authentication
means sending the. connection request. if so many requests are continuously coming
to our router, then it will stop performing properly. Because each connection
packet that has username & password has too be checked and this process will
consume time.. This is such an attack which poisons or ruins ArP or we keep the
flow of packets so much that the record of Arp gets ruined. Arp cache poisoning
attack is a very interesting thing. we will see how these attacks work
practically..
The important thing that is remaining is the way to hack Wifi and what are the
steps to do that. so, This is the step-by-step process through which we hack wi
wifi. the first thing is Wifi discovery, which means discovering the Wiwifi. then
GPs mapping is done in which it is confirmed how far it is from us and how much
delay can happen. after this comes beacon flood, which is such an attack in which
so many users are made related to essids which confuses users with whom to
connect.. Our next topic is wireless traffic analysis, which means that analyzing
or monitoring or keeping an eye on or trying to intercept and save the data that is
WsCube Tech
A black hat hacker can steal all your data and how you can be safe from this. so,
let 's see the complete process where we will understand the vulnerabilities of our
wifi and how to correct them. we will learn in complete detail what a wifi is, what
kind of device it is, how it works, what are the its disadvantages and how a hacker
access your data. we will understand the history and security of wifi from
starting. our first wep was wep. the encryption that was being followed in this was
RC4, which is not much strong, but it 's fine. after that, WPa came. after this our
data started going a bit securely. WPa 2 is the technology that is being used
nowadays. Even though some technologies have come ahead of it too. it brought a
very good encryption technique called AeScCmP, which came in. In 2004. it used to
apply encryption according to the bit size of 128 bits. it was very useful because
they could not do cracking until they get exact password.. So here it took a lot of
effort to crack the handshake files. now, we will be using WPa 3, which is its
higher version and even more secure and advanced..
The last point is that it is using key size of 128 bits to 256 bits. hence, it has
become even more secure. along with that, it will use security protocols also.
alongside that, we will find loopholes in these security protocols only. and we
will also see how we can exploit those vulnerabilities. we need to understand this
to apply all the hacking technologies. our router has 3 [UNK] private IP, public Ip
and mac address.. Mac address is a hardware address which never changes. the last
and final identity that never changes is its media access control address. our
router can give any IP to any system from the Ips after 192. 168. 1. 0 and before
255. 255. 255255255.. It can give these identity IPs. our broadband has a very good
service or a protocol, which is called ArP. ArP is a protocol that will find out.
What address is allotted to you. it will share data of ArP packets through radio
signals which will ask every system what IP it has.. The next IP is 192. 168. 0. 2
which it allots to this system. then it will keep on allotting some IPs to every
system..
There is one of the biggest flaws in our Android devices and in many systems. this
system asks only 1 thing to get connected to this wifi and that is the essid.. This
is a flaw which means that it does n't match the mac address first. it directly
does the data transfer according to that name, which is a very big flaw. there is
work going on to correct This flaw. dos attack or denialofservice attack is called
denial of service attack.. In this attack, an attacker sends so much data to a
victim system for processing that the victim system is hanging and it is hanging.
as a result,, it will crash or automatically shut down or it will shut down.. This
same thing happens in our wifi. deauthentication flood attack means we are
disconnecting someone. deauthentication flood is a part of dos and authentication
means sending the. connection request. if so many requests are continuously coming
to our router, then it will stop performing properly. Because each connection
packet that has username & password has too be checked and this process will
consume time.. This is such an attack which poisons or ruins ArP or we keep the
flow of packets so much that the record of Arp gets ruined. Arp cache poisoning
attack is a very interesting thing. we will see how these attacks work
practically..
The important thing that is remaining is the way to hack Wifi and what are the
steps to do that. so, This is the step-by-step process through which we hack wi
wifi. the first thing is Wifi discovery, which means discovering the Wiwifi. then
GPs mapping is done in which it is confirmed how far it is from us and how much
delay can happen. after this comes beacon flood, which is such an attack in which
so many users are made related to essids which confuses users with whom to
connect.. Our next topic is wireless traffic analysis, which means that analyzing
or monitoring or keeping an eye on or trying to intercept and save the data that is