Home Blog Techsimo
Home » , » 4 secrets of sacred hacker you need to know

4 secrets of sacred hacker you need to know

4 secrets of sacred hacker you need to know


You often use a Wi-Fi hotspot or wireless access point that has encryption so that you feel safe? Do not be swayed simply because hackers want you to believe that you are protected so that you will remain vulnerable to attack.

Here are 4 secrets "sacred" hackers that they expect will not be known to the victim. If you know the secret below they may not be able to get into your network or computer.

Curious what the secret? More details, see below.

1. Penetrating WEP Encryption

Encryption Wired Equivalent Privacy (WEP) could not protect your wireless network completely. WEP can be penetrated by hackers in a matter of minutes, which means the WEP encryption only gives a false sense of security.

Hacker "beginner’s class" or a beginner can even beat base WEP security quickly, so basically WEP encryption cannot be used as a protection mechanism.

Moreover, many people downloading their wireless router settings and never change wireless encryption over the years from WEP to WPA2 security of new and more powerful. Updating your router to WPA2 is a fairly simple process. Visit the official website of your wireless router product to obtain instructions.

2. Breaking the MAC Filter

Using a wireless router to filter Media Access Control (MAC) to prevent unknown devices join your network is not effective and easily penetrated.

Each IP-based devices, whether computer, gaming systems, printers, and so definitely has a unique MAC address code in the network. Many routers that allow you to permit or deny network access to devices that have a MAC address.

Wireless router check the MAC addresses requesting device that wants to get into the network and comparing it or rejected. This sounds like a super tight security mechanisms. But the problem hackers can create fake MAC addresses that can easily be allowed to get into your network.

All you need do is to use the package program to "sniff or eavesdrop" wireless traffic and see the MAC addresses across the network. The program can then be set to match the MAC address is allowed into the network.

3. Aims Router Remote Controlled

Many wireless routers have a setting that allows you to manage the router via a wireless connection. This means you can access all security router settings and other features without having to be in the computer connected to the router using an Ethernet cable.

Although the setting is very effective to manage the router from a distance, but on the other hand provides a loophole for hackers to steal your security settings and make them more freely frolic in your network

Moreover, many people never change their wireless router admin password, which allows hackers to break into your network. It is recommended to disable the management of a wireless router so that only you can manage the wireless router settings.

4. Reconnaissance Public Hotspot Wi-Fi free

Hackers can use tools like Firesheep and AirJack to attack where they broke into a wireless conversation between sender and receiver. Once they made it into the lines of communication, they can steal your account password, read e-mail, and view your instant messages.

They can even use tools like SSL Strip to get passwords of websites that you visit. For that service providers use Virtual Private Network (VPN) to protect all commercial traffic you when using a Wi-Fi network (not a public Wi-Fi hotspots are free).

Secure VPN provides an additional security layer that is very difficult to penetrate. Thus, hackers go after other targets are more easily compromised.


Share To:

 
Copyright © 2015. Blog.Techsimo - All Rights Reserved | About | Contact | TOS | Disclaimer | Privacy | Advertise
Template created by Andreas firmansyah - Proudly powered by Blogger