How People Are Hacking Wireless Networks & How To Protect Yourself

wirelesssecurity   How People Are Hacking Wireless Networks & How To Protect YourselfYou’ve set up your wireless network. You’ve been good, too – you gave your router a unique ID that won’t be easily mixed up with other wireless routers and you have secured the network with a password so not just any passer-by can piggyback off your network as a means of downloading South Park episodes. You don’t have to worry about hackers now, right?

Well, not so fast. Although you’ve taken the basic steps required you still need to be aware of some hacking methods that can be used to gain access to your network despite the safeguards you have in place. You also need to be very wary whenever you are using a wireless network that is not your own.

Let’s take a look at the techniques hackers use when hacking wireless networks and what you can do about it.

Sniffing

The simplest of all attacks, sniffing is the simple process of intercepting wireless data that is being broadcasted on an unsecured network. If you are at home, and your network is secured, you don’t have to worry too much about sniffing attacks. However, most networks that are in the wild are not secured, including many of them at hotels and coffee shops.

It is easy to take a “It won’t happen to me” attitude, particularly when you’re using the free WiFi at a favorite coffee haunt. Here’s the thing – the sniffer may not be one of your coffee sipping cohorts. Sniffers can just as easily be somewhere outside of the shop, merrily picking information off the airwaves. There is even an activity known as Wardriving that involves driving around a city picking up wireless data.

Google was recently busted for this activity when it was revealed that some of their Google Maps vehicles had also been picking up data from unsecured wireless networks as passed by. Google claimed it was accidental and that they meant no harm. Most Wardrivers also claim to be benevolent, often stating that they’re only trying to map out wireless networks. Still, it is easy to see how a malicious person could use this technique to try and steal sensitive data.

googlewardrivers   How People Are Hacking Wireless Networks & How To Protect Yourself

Full protection can only come from not using unsecured wireless networks. That may not be practical however, so your second best defense is to be careful about what information you send on an unsecured network. Before entering any information, be it a password or a comment on a blog, ask yourself – would I care if  a stranger obtained this information?

Spoofing

routers   How People Are Hacking Wireless Networks & How To Protect YourselfIf you’ve set up a wireless network you’ve probably noticed that your computers no longer need to be told to access your network. Instead they access it automatically as soon as they move within signal range.

This is a very convenient feature, but it is also prone to exploitation. Hackers often attack a wireless network by simply creating a new network with a stronger wireless signal and a copied SSID in the same area as a legitimate network. This causes unsuspecting computers to automatically connect to the spoofed network instead of the real one.

Setting up your computer’s security settings so that it does not automatically connect to networks is the best way to counter-act this threat. You can also try to protect your home network by using a free network mapping tool like Spiceworks. A sudden change in your network map is a sign your wireless network may is being hit by a spoofing attack.

Encryption Cracking

padlock   How People Are Hacking Wireless Networks & How To Protect YourselfIn a perfect world, you could set up your wireless network with an encryption key and be protected for life, but the real world simply doesn’t work that way. As encryption keys become more advanced hackers also increase their skills and develop new tools for penetrating even well protected wireless networks.

There are numerous ways to crack a wireless network’s encryption, but even simplistic methods can work. The website WPA Cracker, for example, can be used to hit a network with a brute force dictionary attack  that simply throws random words at a secured wireless network to try and crack it. This method can take a long time, and sometimes requires luck on the hacker’s part, but it is often effective.

The first step in protecting yourself people hacking wireless networks is to use WPA encryption. WEP, the older encryption technology, has been completely de-constructed by hackers and is now considered quite easy to crack. The second step is the use of a long, highly randomized encryption key. Long, random encryption keys are a pain in the butt to remember, but they’re much harder to crack.

Conclusion

These are the three most common methods of hacking a wireless network, but they’re not the only ones. New exploits are found constantly, making it difficult to ever ensure that you are 100% protected.

That’s the bad news. The good news is that, unless you happen to be a corporate CEO or a senator, you’re unlikely to ever be targeted by a cutting-edge attack. Most attacks are tried-and-true methods that rely on the target’s negligence rather than the hacker’s advanced knowledge. Simple steps – such as making sure your encryption key is long and highly randomized and never accessing system websites over wireless while in the wild – will protect you from most threats.

The comments were closed because the article is more than 180 days old.

If you have any questions related to what's mentioned in the article or need help with any computer issue, ask it on MakeUseOf Answers—We and our community will be more than happy to help.

18 Comments -

TechroSyncVibe

This is a good article, very useful http://bit.ly/af4ALg

jasray

MAC filtering helps.

goffinaz

Most wireless routers allow the administrator to set up the wifi network such that only devices with a specified mac address be allowed to connect to the network. This, of course, only prevents unauthorized outside users to connect to your wifi network and does not protect your device from connecting to another network.

James Haight

as Jasray said- MAC filtering.

James Haight

Re:WPA. TKIP encryption is easy to break, so definitely use WPA2 with AES encryption.
Re:spoofing. it’s actually easier than that, even. there is software out there (not to be named here) which basically just says “yeah, I’m that network” whenever a WiFi device says “hey, is my network here?”. dead-simple man-in-the-middle attack.

James Haight

Re:re:spoofing. this is a common attack in high-volume areas such as airports, bus stations, libraries, etc. so if you’re using wifi in a public place, use some common sense- is your home router anywhere near you? no? then why would you be connecting to YeOldeNetworkeOfJoeSchmoe?

Aibek

thanks for the input! I think a good rule of thumb is not to use any public network UNLESS you’re 100% sure it’s secure.

James Haight

Re:WPA. TKIP encryption is easy to break, so definitely use WPA2 with AES encryption.
Re:spoofing. it’s actually easier than that, even. there is software out there (not to be named here) which basically just says “yeah, I’m that network” whenever a WiFi device says “hey, is my network here?”. dead-simple man-in-the-middle attack.

Aibek

Some related MakeUseOf articles,How To Secure Your Wireless Network Connectionhttp://www.makeuseof.com/tag/secure-your-wirele…How To Secure Your D-Link Wireless Routerhttp://www.makeuseof.com/tag/how-to-increase-se…4 Ways To Securely Configure A Wireless Router As A Public Access http://www.makeuseof.com/tag/tips-securely-conf…How To Set Up Your Own Secured Wi-Fi Hotspothttp://www.makeuseof.com/tag/how-to-set-up-and-

Aibek

Some related MakeUseOf articles,

How To Secure Your Wireless Network Connection
http://www.makeuseof.com/tag/secure-your-wirele

How To Secure Your D-Link Wireless Router
http://www.makeuseof.com/tag/how-to-increase-se

4 Ways To Securely Configure A Wireless Router As A Public Access
http://www.makeuseof.com/tag/tips-securely-conf

How To Set Up Your Own Secured Wi-Fi Hotspot
http://www.makeuseof.com/tag/how-to-set-up-and-

Dbreedwell

Timing was great. I’m going to setup a wireless network in my son’s new apartment and this couldn’t have come at better time to prove to him that we needed to setup a password and encryption. Thanks MakeUseOf.com!!

Aibek

you’re welcome!

Dbreedwell

Timing was great. I’m going to setup a wireless network in my son’s new apartment and this couldn’t have come at better time to prove to him that we needed to setup a password and encryption. Thanks MakeUseOf.com!!

Billyhill88

MAC filtering does not help at all. That is a myth. As soon as one client connects to the AP, that MAC address can be sniffed and spoofed. Read aircrack-ng.

some guy

disabling wireless.

Oron Joffe

Hiding the SSID can help. Like all the other methods, it can’t prevent hacking altogether, but will make the hacker’s job more difficult. Switching of WiFi if you don’t need it is VERY sensible and of course changing the default password on the router is a must.

Bubba

Hiding the SSID does not help. The SSID is still available to wireless cracking software such as aircrack-ng.