SlideShare a Scribd company logo
How to Hack Wireless Internet Connections in 3 Easy Steps Presented By  Joshua Johnson
How to Hack Wireless Internet Connections This presentation is intended to inform the audience about methods used to “hack” wireless internet connections, not for any malicious use but strictly for educational purposes and personal intentions such as recovering a misplaced network key for the users own wireless connection.
Wireless Internet The term “wireless internet” is perfectly self-explanatory.  It is internet access without the use of wires.  Instead it uses radio frequency bands to exchange information between your computer and the Internet. Wireless access allows users to  connect to the internet from any location within range of a wireless access point.
Wireless Internet Equipment For home use, the basic equipment is: Wireless NIC card Wireless router or access point Internet access
Advantages No wires Mobility Faster speeds Widely available equipment Convenience Inexpensive to set-up
Disadvantages Limited range Interference with other wireless access points Encryption can be broken even at its strongest
Hacking Wireless Internet Wireless networks are very common.  It is also very common to find wireless networks that are unsecured.  Maybe the users are lazy or maybe they are not savvy when it comes wireless networks.  Whatever the reason, hackers have found wireless networks relatively easy to break into, and even use wireless technology to crack into non-wireless networks.
Wireless Encryption The main source of vulnerability associated with wireless networks are the methods of encryption.  There are a few different type of wireless encryption including:
WEP Stands for Wired Equivalent Privacy. Breakable even when configured correctly Can be broken in as little as 3 minutes
WPA or WPA2 Stands for Wi-Fi Protected Access Created to provide stronger security Still able to be cracked if a short password is used.  If a long passphrase or password is used, these protocol are virtually uncrackable. Even with good passwords or phrases, unless you really know what your doing, wireless networks can be hacked and here’s how…….
A little info… When a user uses wireless internet they generate what are called data “packets”.  Packets are transmitted between the wireless NIC card and the wireless access point via radio waves whenever the computer is connected with the access point.
More info… Depending on how long the computer is connected, it can generate a certain number of packets per day.  The more users that are connected to one access point, the more packets are generated.
First… You must locate the wireless signal This can be done by using your default Windows tool “View Available Wireless Network” More useful tools include NetStumbler and Kismet. Kismet has an advantage over the other because it can pick up wireless signals that are not broadcasting their SSID.
Second… Once you located a wireless network you can connect to it unless it is using authentication or encryption.  If it is using authentication or encryption then the next step would be to use AirSnort, a tool for sniffing out and cracking WEP keys.
AirSnort AirSnort must gather about 5 to 10 million packets before it can even begin to crack a wireless key. This could take anywhere between a few minutes to a few weeks depending on how many packets are being generated. If a small number of people are using the network then it will most likely take weeks.
Third… Once AirSnort has recovered enough packets it will then go to work on reading the captured information gathered from the packets and crack the key giving you access.  Other tools such as CowPatty can use dictionary files to crack hard WPA keys.
Prevent Your Network from Getting Hacked Don’t broadcast your SSID .  This is usually done during the setup of your wireless router. Change the default router login to something else.  If your equipment supports it, use WPA or WPA 2 because it offers better encryption which is still able to be broken but much harder. Always check for updates to your router. Turn off your router or access point when not using it.
Prevent Your Network from Getting Hacked There is no such thing as 100% percent security when using wireless networks but at least with these few simple steps you can make it harder for the average person to break into your network.
THE END

More Related Content

PPT
How to hack wireless internet connections
PDF
A tutorial showing you how to crack wifi passwords using kali linux!
PPTX
Wireless hacking
PPTX
Wifi hacking
PDF
Cracking WPA/WPA2 with Non-Dictionary Attacks
PPTX
WIFI Hacking
PPTX
Wireless hacking
PPT
Wifi Security
How to hack wireless internet connections
A tutorial showing you how to crack wifi passwords using kali linux!
Wireless hacking
Wifi hacking
Cracking WPA/WPA2 with Non-Dictionary Attacks
WIFI Hacking
Wireless hacking
Wifi Security

What's hot (19)

PPTX
WiFi Secuiry: Attack & Defence
PPTX
Hacking Wireless Networks : Null Delhi (November)
PPT
Hack wireless internet connections or wifi
PPT
Wireless Device and Network level security
ODP
Wifi Security, or Descending into Depression and Drink
PDF
Understanding WiFi Security Vulnerabilities and Solutions
PPS
Workshop on Wireless Security
PPT
Ch06 Wireless Network Security
PPTX
Wlan security
PPTX
Wifi Security
PDF
Pentesting Wireless Networks and Wireless Network Security
PPT
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
PPT
Wireless security presentation
PPTX
Wireless Attacks
PDF
Wi-Fi security – WEP, WPA and WPA2
PDF
Wireless Hacking
PDF
Wi-fi Hacking
DOCX
Packet sniffers
WiFi Secuiry: Attack & Defence
Hacking Wireless Networks : Null Delhi (November)
Hack wireless internet connections or wifi
Wireless Device and Network level security
Wifi Security, or Descending into Depression and Drink
Understanding WiFi Security Vulnerabilities and Solutions
Workshop on Wireless Security
Ch06 Wireless Network Security
Wlan security
Wifi Security
Pentesting Wireless Networks and Wireless Network Security
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Wireless security presentation
Wireless Attacks
Wi-Fi security – WEP, WPA and WPA2
Wireless Hacking
Wi-fi Hacking
Packet sniffers

Viewers also liked (6)

PDF
Hack wifi password using kali linux
PDF
Wifi Password Hack v2.85 - The best software to hack the Wifi networks !
PDF
Wireless LAN Security, Policy, and Deployment Best Practices
PPT
Wlan security
PPT
Wireless LAN security
PDF
Wireless Networking Security
Hack wifi password using kali linux
Wifi Password Hack v2.85 - The best software to hack the Wifi networks !
Wireless LAN Security, Policy, and Deployment Best Practices
Wlan security
Wireless LAN security
Wireless Networking Security

Similar to How To Hack Wireless Internet Connections (20)

PPT
Howtohackwirelessinternetconnections 100105124156-phpapp01
PDF
Wireless security
PPT
AleksandrDoroninSlides.ppt
PPT
Wireless Security.ppt
PPT
Wireless Security.ppt
PPTX
Wireless security by mujajhid rana
PDF
Wireless Security Needs For Enterprises
PPTX
Wireless Security
PPTX
Wirless Security By Zohaib Zeeshan
PPTX
Wireless Security null seminar
PDF
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
PDF
Howto Crack Or Hack A Wireless Network With Wired Equivalent Privacy Wep
PPT
null Pune meet - Wireless Security
PPTX
Wifi cracking Step by Step Using CMD and Kali Linux 2018
PDF
Wireless security
PPTX
Exploiting WiFi Security
PDF
Wi fi
PDF
Cracking WEP Secured Wireless Networks
PDF
Wireless hacking tools.jpeg
PPTX
Unsecured wireless networks final
Howtohackwirelessinternetconnections 100105124156-phpapp01
Wireless security
AleksandrDoroninSlides.ppt
Wireless Security.ppt
Wireless Security.ppt
Wireless security by mujajhid rana
Wireless Security Needs For Enterprises
Wireless Security
Wirless Security By Zohaib Zeeshan
Wireless Security null seminar
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Howto Crack Or Hack A Wireless Network With Wired Equivalent Privacy Wep
null Pune meet - Wireless Security
Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wireless security
Exploiting WiFi Security
Wi fi
Cracking WEP Secured Wireless Networks
Wireless hacking tools.jpeg
Unsecured wireless networks final

Recently uploaded (20)

PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PPTX
Pharma ospi slides which help in ospi learning
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
Cell Types and Its function , kingdom of life
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
01-Introduction-to-Information-Management.pdf
PDF
Sports Quiz easy sports quiz sports quiz
PPTX
Institutional Correction lecture only . . .
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
Lesson notes of climatology university.
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
Cell Structure & Organelles in detailed.
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
RMMM.pdf make it easy to upload and study
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Pharma ospi slides which help in ospi learning
Pharmacology of Heart Failure /Pharmacotherapy of CHF
102 student loan defaulters named and shamed – Is someone you know on the list?
Cell Types and Its function , kingdom of life
Abdominal Access Techniques with Prof. Dr. R K Mishra
01-Introduction-to-Information-Management.pdf
Sports Quiz easy sports quiz sports quiz
Institutional Correction lecture only . . .
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Lesson notes of climatology university.
Supply Chain Operations Speaking Notes -ICLT Program
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Microbial disease of the cardiovascular and lymphatic systems
Cell Structure & Organelles in detailed.
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
RMMM.pdf make it easy to upload and study

How To Hack Wireless Internet Connections

  • 1. How to Hack Wireless Internet Connections in 3 Easy Steps Presented By Joshua Johnson
  • 2. How to Hack Wireless Internet Connections This presentation is intended to inform the audience about methods used to “hack” wireless internet connections, not for any malicious use but strictly for educational purposes and personal intentions such as recovering a misplaced network key for the users own wireless connection.
  • 3. Wireless Internet The term “wireless internet” is perfectly self-explanatory. It is internet access without the use of wires. Instead it uses radio frequency bands to exchange information between your computer and the Internet. Wireless access allows users to connect to the internet from any location within range of a wireless access point.
  • 4. Wireless Internet Equipment For home use, the basic equipment is: Wireless NIC card Wireless router or access point Internet access
  • 5. Advantages No wires Mobility Faster speeds Widely available equipment Convenience Inexpensive to set-up
  • 6. Disadvantages Limited range Interference with other wireless access points Encryption can be broken even at its strongest
  • 7. Hacking Wireless Internet Wireless networks are very common. It is also very common to find wireless networks that are unsecured. Maybe the users are lazy or maybe they are not savvy when it comes wireless networks. Whatever the reason, hackers have found wireless networks relatively easy to break into, and even use wireless technology to crack into non-wireless networks.
  • 8. Wireless Encryption The main source of vulnerability associated with wireless networks are the methods of encryption. There are a few different type of wireless encryption including:
  • 9. WEP Stands for Wired Equivalent Privacy. Breakable even when configured correctly Can be broken in as little as 3 minutes
  • 10. WPA or WPA2 Stands for Wi-Fi Protected Access Created to provide stronger security Still able to be cracked if a short password is used. If a long passphrase or password is used, these protocol are virtually uncrackable. Even with good passwords or phrases, unless you really know what your doing, wireless networks can be hacked and here’s how…….
  • 11. A little info… When a user uses wireless internet they generate what are called data “packets”. Packets are transmitted between the wireless NIC card and the wireless access point via radio waves whenever the computer is connected with the access point.
  • 12. More info… Depending on how long the computer is connected, it can generate a certain number of packets per day. The more users that are connected to one access point, the more packets are generated.
  • 13. First… You must locate the wireless signal This can be done by using your default Windows tool “View Available Wireless Network” More useful tools include NetStumbler and Kismet. Kismet has an advantage over the other because it can pick up wireless signals that are not broadcasting their SSID.
  • 14. Second… Once you located a wireless network you can connect to it unless it is using authentication or encryption. If it is using authentication or encryption then the next step would be to use AirSnort, a tool for sniffing out and cracking WEP keys.
  • 15. AirSnort AirSnort must gather about 5 to 10 million packets before it can even begin to crack a wireless key. This could take anywhere between a few minutes to a few weeks depending on how many packets are being generated. If a small number of people are using the network then it will most likely take weeks.
  • 16. Third… Once AirSnort has recovered enough packets it will then go to work on reading the captured information gathered from the packets and crack the key giving you access. Other tools such as CowPatty can use dictionary files to crack hard WPA keys.
  • 17. Prevent Your Network from Getting Hacked Don’t broadcast your SSID . This is usually done during the setup of your wireless router. Change the default router login to something else. If your equipment supports it, use WPA or WPA 2 because it offers better encryption which is still able to be broken but much harder. Always check for updates to your router. Turn off your router or access point when not using it.
  • 18. Prevent Your Network from Getting Hacked There is no such thing as 100% percent security when using wireless networks but at least with these few simple steps you can make it harder for the average person to break into your network.