Thursday 9 June 2016

Wireless Hacking

Wireless Hacking

Hello Friends, Today we are going to study "Wireless Hacking". Wireless networks are all around , from home to corporate server farms. They make our lives by avoiding physical connectivity to networks via cables while providing guaranteed consistent network connectivity of devices. It is an advantage with a certain danger attached to it . Wireless network are prone to hacking attacks. We will examine a couple of strategies to secure wireless networks to accomplish satisfactory security.


How do Wireless Network Work ?

Before we discuss wireless network security and weakness, we must understand the fundamental radio transmission and the IEEE 820.11 protocol, regularly known as the WLAN protocol. This protocol connects two or more devices within the short range, Using radio signals. to set up a wireless network, you require a wireless access point and a wireless network card for every device to be connected. The access point is also referred as a Hotspot. It consists of a radio transmitter which is used for transmitting and receiving signals, additionally it also contains hardware which converts data signals to radio signals & vice versa.

we can access a wireless network using wireless network enabled device such as a laptop, tablet, smartphones etc. within the transmission range of a wireless point. most of the device have the wireless network option enabled by default.

you can connect to any wireless network if it is not password protected. if it is password protected then you will need the password to gain access.

Wireless network Authentication 

As the wireless network network is open to every body who has a wireless network enabled gadget, most network are now configured with some kind of encryption and authentication mechanisms.

Let's take a look at some of the commonly used wireless authentication techniques.

WEP

WEP is the acronym for wired equivalent privacy. It was developed for IEEE 802.11 WLAN standards. Its objective was to provide data protection similar or equivalent to that provided by wired networks. WEP encrypts the data, When transmitted over the networks to keep it safe.

WEP Weakness

WEP has significant design flaws and vulnerabilities 

  • WEP is based on passwords which makes it vulnerable to dictionary based attacks.
  • WEP uses R encryption algorithm to create stream ciphers. The stream Cipher input is made of an initial value (iv) and a secret key. The length of the initial value (iv) is 24 bits long while the secret key can either be 40 bits or 140 bits long. The total length of both the initial value and secret can either be 64 bits or 128 bits long. The lower possible value of the secret key makes it easy to crack it.
  • Weak initial values combination don't encrypt adequately.
  • Initial values can be reused.

WPA

WPA stands for WI-FI Procted access. It is A security Protocol developed through The WI-FI alliance in response to the weakness found in WEP. It is used to encrypt data on 802.11 WLAN's. It uses higher initial values 48 bits as an alternative to the 24 bits that WEP uses. It uses temporary Keys to encrypt packets.

WPA Weakness

  • The collision avoidance implementation can be broken.
  • It is vulnerable to DoS attacks.
  • Pre-shared keys Use passphrases. Weak passphrases are vulnerable to dictinary based attacks.
If you like my post & my Blog Please Comment and review it 
______________Thank You________________

Finding The location Of a Server

Finding The location Of a Server

Hello Friends, Today i am going to Show to How to Find the location of a Server. This is very Important step in hacking a Server. In a Case you got caught by Cyber Police you can get rid out of the case from the loopholes in Cyber Laws of that country. It will Only happen when you know the Cyber law of that Country this is only possible when you know the location of the server.


  

Pre-requisite

  • A Computer installed with OS
  • Internet Connection 

What is a Web server ?

web server is a computer system that processes requests via HTTP, the basic network protocol used to distribute information on the World Wide Web. The term can refer to the entire system, or specifically to the software that accepts and supervises the HTTP requests.

The primary function of a web server is to store, process and deliver web pages to clients. The communication between client and server takes place using the Hypertext Transfer Protocol (HTTP). Pages delivered are most frequently HTML documents, which may include imagesstyle sheets and scripts in addition to text content.

Steps to Find The Location Of a Server

1- Open Your Web Browser.

2- Search For "www.iplocation.org".

3- "iplocation.org" Looks like This


4- Give the Target Domain or IP Address.


5- Click on IP lookup.

6- It will show you Result Like This.

You can See that It shows the IP Address Of the Target & Country, Region, City .

[Note]
This Tutorial Is Only for Educational Purpose.

If you like my Blog, My Post's Please leave a Comment 
____________________________________Thank You ____________________________________