In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-03-29 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
1. Having nothing to do, I searched the nearby wifi. The tool used was WiFi***. Click on one button to query * *, and there are actually two wifi using weak passwords. Then just connect with one. The wifi of my company is this wifi named 25904.
2. After connecting to the wifi with the weak password, the next thing to do is to see which computers or terminals are connected under the wifi. The next tool to use is the Android version of the artifact-dsploit this tool, friends who need to go to Duniang or Google to search for it.
3. As shown in the following figure. The first is the router address, and the second is the connected terminal, including the IP and MAC address of the terminal. The third one is my own cell phone.
4. Scan the system of this terminal. Yo, it's iphone.
5. Next, I scanned the port and found nothing available.
6. This is one of the interfaces of the tool, and the menu used now is MITM. What is MITM? MITM is also called middleman. The so-called MITM*** is to intercept normal network communication data, and carry out data tampering and sniffing, while both sides of the communication do not know.
7. According to the above functions, we can see that session hijacking is more commonly used as we do. The picture below is another terminal. This is a PC. So we can see what kind of web pages this user is on at this time.
For example, we saw that he was using QQ, and it could be Qzone and so on. And then there is Taobao. At this time, we do not have to enter the user's QQ password to access Qzone, Taobao and so on.
Of course, we only do the test, so I can only get a few gold coins from it. Heh heh.
9. I thought it would be over at this point. Oh, who knows to be used to it. When I typed 192.168.1.1 into the mobile browser, I actually saw the login page of the router. Try entering the default user name and password. Well, the login was a success.
If the router can log in, it can do more. You can limit the speed of this user and so on. Including his dial-up user name and so on.
10. The following figure shows the wifi password.
11. The following picture shows the IP after dialing successfully. In this case, he should use what kind of community network or village network in the city.
11. We can also see how many terminals are connected to this router
12. Hey, we can also limit the flow of traffic to him.
Of course, we can also change the login password of his router.
We also saw the user name for dialing.
14. In the end, I kindly reminded a user and gave him a JavaScript script to change the wifi connection password and the login password of the router.
Summary:
Some people will ask and worry about it. In fact, we all know that nothing is absolutely safe. Of course, it's the same on the Internet. So how can we avoid this problem?
1. When we set the wifi password, we try to set something a little more complex. Don't use pure numbers, pure passwords or cell phone numbers, birthdays, these simple ones. For example, a password combination, we use upper and lower case. Numbers. Special symbols are combined so that they are relatively safe.
2. if you have finished configuring the router, be sure to change the login password of the router. It's the same as above. Use special symbols, upper and lower case. Numbers, that sort of thing.
3. Now most routers can bind MAC addresses, so we set up MAC addresses on the routers that bind only the devices we use. This can also be better guard against some.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.