Protecting Yourself:
Through the course of this article, I’ve walked you through the steps to hack someone’s wireless. What can you do to protect your home wireless network? The first step is to change the name of the network to something other than the default name. Don’t name your network “linksys” or “dlink” or anything similar. It’s a giant red flag that screams hack me. The second thing you should do is use WPA or WPA2 for your encryption. In addition to encrypting it, you need to pick a strong password. A strong password is something between 13 and 63 characters long that mixes uppercase, lowercase and numbers. Throw in some punctuation marks and symbols (.?!$) if you really want to screw with the hackers. If you do all of this, then more than likely you will be safe from attack. This will make it near impossible to brute force that password within any of our lifetimes.
Things That Won’t Protect You:
- Hiding your SSID
- MAC Filtering
- Using WEP encryption
Hiding your SSID does nothing to prevent hackers from finding the actual name of your network. There are many tools out there that render it useless as a means of security. Often times hiding your SSID can lead to network connection problems for legitimate users. In the very beginning of the article I showed you how to spoof your MAC address, therefore it can hardly be considered a valid security measure. WEP encryption has been broken for some time now. There are many tutorials online that specialize in cracking WEP encryption in under a minute.
Disclaimer And Closing Statements:
The information here, is presented with the intent that it be used for testing of your own networks. Do not hack any networks that you do not have permission to hack. It is illegal.
I hope that by reading this you can take something away about the state of wireless security. During my testing, I was able to get around 25000 PMKs with my i7 system running with a 4870 x2. Post your PMKs score and see if you can beat us. Have an interesting anecdote about your experiences? Post that too, we love to hear from you guys. Depending on reader response, I may post a follow up article, detailing how to run pyrit over the network. This will allow you to build a super powerful password cracking cluster. If you have any questions regarding any of the steps, feel free to post a comment and we will try to help as best we can. We’ve covered a lot of material in this article and it’s not surprising if you have questions.
please sent me wifi
master key
Your kidding right? You do have some kind of idea how wi-fi works right?
softwre plase
how to hack wifi near 100m by dell laptop.
What would be even more useful is to run a generic cluster using GPUs and boot CDs/USB drives. Imagine being able to throw a problem like generating rainbow files, simulating weather, rendering 3D scenes, playing chess (Grin) or whatever you want so long as the algorithm is suitable to clusters.
I wonder if anyone makes motherboards with several PCI-E slots for rackmount render farms… It would be an economical solution for some people who need to do huge batch rendering jobs. Come to think of it, the same reasoning applies to recoding videos.
Actually Nvidia has a solution that is exactly as you described (using their video cards of course). It’s called Tesla. You can read more about their solutions at their site. http://www.nvidia.com/object/tesla_computing_solutions.html