blog trackingRealtime Web Statistics WiFi Archives - Page 2 of 3 - Gregory D. Evans | Worlds No. 1 Security Consultant

Posts Tagged ‘WiFi’

How To Hack WiFi – WiFi Hacker


Download WiFi Hacker Tool 2013 Click Here: http://bit.ly/11YOvYn Want to learn how to hack wifi networks like a pro? Maybe you just want to know how to get f…

________________________

http://gregorydevans.com – http://gregorydevans.wordpress.com – http://hackerforhire.com – http://hackerforhireusa.com

WiFi Hacker Tool Windows 8 Working 100%


http://windows8wifihacker.blogspot.co.uk Download From ^ (IGNORE) …

________________________

http://gregorydevans.com – http://gregorydevans.wordpress.com – http://hackerforhire.com – http://hackerforhireusa.com

SSCC 95 – Oracle patches, lost USB sticks, App Store shenanigans and WiFi heists

Chet and Duck take on the week’s news once again in their inimitable and informative style. You’ll be glad to hear that there are several “good news” stories this week – data that didn’t leak, malware that didn’t infect, and cybercriminals who didn’t get away with it! View full post on Naked Security – Sophos

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

View full post on National Cyber Security

FBI Warns Business Travellers Of Hotel Wi-Fi Malware Scam

View full post on News ≈ Packet Storm

View full post on National Cyber Security

how to find your wifi router password


how to find your wifi router password

View full post on National Cyber Security

HTC Patches Wi-Fi Security Flaw in Android Phones

The vulnerability could allow an attacker to view all Wi-Fi user names, passwords and SSID information stored on a device.

View full post on eSecurityPlanet RSS Feed

View full post on National Cyber Security

The Possible Security Risks of The Free WiFi Zone During Sinulog and Some Tips to Prevent It

sinulogroute

Sinulog Festival Route

News have spread that there will be a free WiFi zone in the Sinulog Festival Route. This connection was brought to us by PLDT DSL. According to Roberto Cabarrubiasuser’s name and password will be provided for FREE to control the user so that the bandwidth will be maintained at its highest level. They will issue an internet card for free at the designated outlet to be announced on a later date. 

Ask a concerned Cebuano, I tried to get more information about this WiFi zone thingy so I asked Kevin Ray Chua about the security measures that the PLDT are working on and he said, “NMS (Network Management System) will be inaccessible to the public and will be tunneled. System ads will be also working here in Cebu.It’s not open access. Monitoring of wifi access will be in Quezon City and local hardware will be in Cebu City.There also have enough people to work on the security aspect of the service.

I’m not really sure if they have IDS or Intrusion Detection Systems and transparent bridge firewalls but most probably they have. Now let’s not touch the NMS of the PLDT Wifi Zone for the Sinulog Festival, let’s focus on the possible security risks of people who are connected to public Access Points of the connection. We can’t deny the fact that there are malicious people who will be connecting to the network. So what can they do?

Some people may be tempted to sniff some users who are logging in to their accounts. Some users may do Man In The Middle Attacks against people who doesn’t have a clue about the risk of connecting to a public WiFi Zone or they could do HTTP session hijacking attacks with FireSheep which is a free and open source extension in Firefox. SSL or HTTPS is not an exemption to these kind of attacks  even though it is one of the world’s most important forms of commercial encryption because a tool called Sslstrip is also on the loose.

ARP Poisoning

sniffing passwords

Thus sniffing in a public WiFi zone allows the attacker to gain valuable information like credit card information, login credentials, MAC Address of the user, passwords, emails, etc. from the user.

Another common attacks used by exploiters against users are some buffer command overflows just like MSRPC DCOM Overflow or the Freefloat FTP Server APPE Command Overflow which allows a remote attacker to to execute arbitrary code or may cause a dos attack.

ftp port

exploiting

Android phones and tablets are also risky especially the older versions so you better update your version to avoid Android data stealing and privileged escalations.

android hacking

Here are some simple tips to prevent these kind of attacks:

1. Even though SSL can be exploited, remember to use HTTPS when logging in to your Facebook, Twitter, email accounts, etc.

2. Use VPN or Virtual Private Networks. Try googling for some free VPN softwares. You could also use SSH tunneling with the use of your free shell accounts.

3. To detect a user who is using FireSheep in your network use BlackSheep.

4. Use two-way firewalls to prevent exploit attacks (though it can be bypassed by some experts). You can download free two-way firewalls in filehippo.com.

5. Patch and update your Windows operating system.

6. Update your antivirus and internet security softwares.

7. If possible, be a ninja and be active.

The Possible Security Risks of The Free WiFi Zone During Sinulog and Some Tips to Prevent It, Blog, Security, possible, WiFi, Free, Some, Tips, during, Risks, Zone, prevent, Sinulog

The Possible Security Risks of The Free WiFi Zone During Sinulog and Some Tips to Prevent It, Blog, Security, possible, WiFi, Free, Some, Tips, during, Risks, Zone, prevent, Sinulog

The Possible Security Risks of The Free WiFi Zone During Sinulog and Some Tips to Prevent It, Blog, Security, possible, WiFi, Free, Some, Tips, during, Risks, Zone, prevent, Sinulog

View full post on ProjectX Blog – Information Security Redefined

View full post on National Cyber Security » Computer Hacking

Exploit of Wi-Fi Protected Setup Flaw Poses Risks for Consumers, Not Enterprises

Many home Wi-Fi networks are at risk thanks to an exploit released over the holidays, but enterprise organizations are generally unaffected by the vulnerability.

View full post on eSecurityPlanet RSS Feed

View full post on National Cyber Security

Reaver version 1.3 Released – Updated Brute Force Attacker against Wifi Protected Setup

reaver 1.3

 

Just today, Tactical Network Solutions has released the updated version of  Reaver which is version 1.3. The new version  “implements the short DH key optimizations described in the original vulnerability release paper, which reduces computation time on the target AP and increases the attack speed.” You can download the latest version here which has  full command line codes and optimizations.

If you want to know how to set it up in your Linux distro please refer to its approved resources in code.google.com which include videos and articles on how to set it up wherein the article I also wrote is featured on the list.

Reaver version 1.3 Released – Updated Brute Force Attacker against Wifi Protected Setup, Blog, attacker, WiFi, Against, UPDATED, Released, version, protected, force, setup, brute, Reaver

Reaver version 1.3 Released – Updated Brute Force Attacker against Wifi Protected Setup, Blog, attacker, WiFi, Against, UPDATED, Released, version, protected, force, setup, brute, Reaver

View full post on ProjectX Blog – Information Security Redefined

View full post on National Cyber Security » Computer Hacking

WiFi, DDoS Vulnerabilities, Cyber-Attacks Lead Week’s Security News

Software security flaws dominated news headlines this week, as security experts discussed the implications of a vulnerability that was found in several Web application frameworks.

View full post on germany cyber attack – Yahoo! News Search Results

View full post on National Cyber Security

Page 2 of 3«123»

Get The New Book By Gregory Evans

Everyone Is Talking About!

Are You Hacker Proof?
$15.95

Find Out More, Click Here!