In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-04-01 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Development >
Share
Shulou(Shulou.com)06/01 Report--
Today, I would like to share with you the relevant knowledge points about the general methods of WiFi attacks, which are detailed in content and clear in logic. I believe most people still know too much about this, so share this article for your reference. I hope you can get something after reading this article. Let's take a look at it.
WI-FI (Wireless Fidelity) is a technology that can connect terminals such as personal computers and handheld devices to each other wirelessly, which provides a lot of convenience for our daily life. At the same time, there are many hidden dangers in wireless network security.
1. Fake MAC address
In many cases, the authentication of the open network is often realized through the MAC address of the Internet device together with the Internet credential. However, because the MAC addresses of devices are easy to change, including smartphones and laptops, there is no security guarantee for this verification method. Hackers can use ARP scanning technology to find other clients that are already connected to the network, so that they can get a complete APR table containing the IP addresses and MAC addresses of all connected devices. Hackers can then try to detect whether these devices generate Internet traffic, and if so, it is very easy to obtain the right to use WiFi through web authentication portal authentication.
two。 Falsify authentication page
This approach is similar to phishing, when a fake authentication page is created to force normal users to log on to the page for authentication, and then hackers can steal their Internet credentials. After all, all traffic in an open wifi network is a kind of unencrypted plaintext data, so it is very convenient for hackers to intercept and tamper with network traffic to achieve the purpose of doing anything they want.
3. Use the way to forget your password
In fact, this method is very simple, that is, to seize the WiFi to be authenticated to provide a password reset service when the password is forgotten. This service often needs to be implemented by the mobile phone number of the connector, and needs to be able to send the relevant new password to the filled mobile phone number, and even need to send the new password through email in many cases. In this case, it is allowed to connect to the client's TMAP/POP mail server, which means that the hacker can easily get the password.
Through the above three ways, hackers can easily obtain the WiFi password, so as to control WiFi in order to achieve the purpose of spreading Trojan virus, so the editor reminds everyone that we should enhance our vigilance to the public WiFi to avoid unnecessary trouble or even property losses.
These are all the contents of this article entitled "what are the common ways to attack WiFi?" Thank you for reading! I believe you will gain a lot after reading this article. The editor will update different knowledge for you every day. If you want to learn more knowledge, please pay attention to the industry information channel.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.