Discover millions of ebooks, audiobooks, and so much more with a free trial

Only $11.99/month after trial. Cancel anytime.

Wifi Hacking Strategy & Ideas
Wifi Hacking Strategy & Ideas
Wifi Hacking Strategy & Ideas
Ebook110 pages1 hour

Wifi Hacking Strategy & Ideas

Rating: 0 out of 5 stars

()

Read preview

About this ebook

Welcome back to a new book about the wireless hacking scene. This book however will not be about the actual keyboard commands; it will cover important stuff to know as tactical, planning, risk assessment and such. This is the lost art of WiFi hacking. Knocking commands in terminal windows is only one part of WiFi-hacking. Innovative solutions, and thinking outside the box are also a part of hacking. It isn’t good enough to just sit in a room with an antenna, there are limitations to that, and the strongest parabolic antenna can’t help you all the time.

This book is written to those who dare to go one step further than just sitting still in an apartment with the neighbours connection
LanguageEnglish
PublisherLulu.com
Release dateMar 25, 2018
ISBN9781387694266
Wifi Hacking Strategy & Ideas

Read more from Mad76e

Related to Wifi Hacking Strategy & Ideas

Related ebooks

Computers For You

View More

Related articles

Reviews for Wifi Hacking Strategy & Ideas

Rating: 0 out of 5 stars
0 ratings

0 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    Wifi Hacking Strategy & Ideas - Mad76e

    Wifi Hacking Strategy & Ideas

    WiFi-Hacking Strategy & Ideas

    Written by: Mad76e

    Dedicated to a Community that disappeared

    Started so well and ended with confusion!

    "In the name of desperation

    In the name of wretched pain

    In the name of all creation

    Gone insane

    We're so fucked

    Shit outta luck

    Hardwired to self-destruct"

    Copyright© 2018 by Mad76e

    All rights reserved This book or any portion thereof may not be reproduced or used in any manner whatsoever without the express written permission of the publisher except for the use of brief quotations in a book review or scholarly journal

    First printing 2018

    ISBN 978-1-387-69426-6

    Mad76e

    Please note:

    This book is written from a hacker’s perspective. Language, value and ideas may not be the same as the authors

    Never do anything against another wireless network without the owner’s written approval. All of the content in this book is 100% legal to do as long as you have permit from the owner to do so. This book is NOT an invitation for you to commit crimes, therefore it’s in your interest to check with your countries laws what applicable.

    Also a special note: Do not trespass!! In some countries it’s a high risk to get shot by the landowners if they find you trespassing on their property!

    Introduction

    Welcome back to a new book about the wireless hacking scene. This book however will not be about the actual keyboard commands; it will cover important stuff to know as tactical, planning, risk assessment and such. This is the lost art of WiFi hacking. Knocking commands in terminal windows is only one part of WiFi-hacking. Innovative solutions, and thinking outside the box are also a part of hacking. It isn’t good enough to just sit in a room with an antenna, there are limitations to that, and the strongest parabolic antenna can’t help you all the time. But as I use to say it all have to do what you want with WiFi hacking. This book is written to those who dare to go one step further than just sitting still in an apartment with the neighbours connection, which if you ask me is a risk!

    Also I will go through some must have hacking gadgets and we may take a very short trip to look at cracking again, especially how to optimise your cracking. This is important, this can actually change everything.

    Risk Assessment

    Let’s first talk about risk assessment, and what that is. Why using this boring subject together with hacking you may ask yourself, and the reason for this is simple. If you ask me, this is something every hacker should use at least once a while, because it will probably save your neck at least a couple of times.

    Simply put!

    Risk analysis, involves systematically using available information to describe and calculate risks with a given system. Risk analysis assesses probabilities of various unwanted events and their consequences.

    We want to do this to understand the risks and make a judgement call if it’s worth the risks. In our world we can see it like a minute or two of breathing and a last chance to go through the attack again in your head to see if it’s worth it. Have I thought things through? You don’t want to run headless in to something

    I will not bore you too much with the details, most of it are self-explained

    The events can actually be anything you feel comfortable with

    It’s a basic formula. Risk = Likelihood x Impact, is typically used to compute a risk value. This formula is also known as a risk assessment matrix. By weighing the likelihood of an event against the level of damage it could cause, the risk assessment matrix is an illustrative tool for management to use to plan for possible disasters.

    For example, we can use a scale of 0 to 10, in which 0 means the threat against the hacker is not likely to occur and 10 means the threat will absolutely occur. The impact 0 means there is no damage done against our hacker, whereas 10 mean the opposite, something that will make us to abort. Numbers in between can represent the result of a statistical analysis of threats.

    Using the quantitative range 0 to 10, you may decide to assign qualitative terms to results (e.g., 0 to 4 = low risk, 5 to 7 = moderate risk, and 8 to 10 = high risk)

    To simplify things, make 10 events and divide the result you get in the Risk column. By doing that you will get an actual difference that we can use as a % value (mathematically incorrect but I think you get my point) the system here will just go to 100! Now low numbers mean high chance to succeed and high numbers doesn’t. However, likelihood has to be thoughtfully determined; you can’t just write down some low enough number. Also important is every individual risk, and make adjustment in your planning how to lower that Impact and Likelihood numbers.

    Different kind of Wireless hackers

    When talking about WiFi hacking, there are a couple of types, or category of hackers we’re talking about. Some of them are scarier than others. From a security point of view they’re all dangerous, because of what they might do inside your network. To shrug your shoulders and say "If they hack my wireless network and get access, so what; it's not that bad if they borrow it once a while" can be totally fatal for you as an owner. You don’t know a shit about the guy who uses the access point and in worst case scenario a lot of police cars will raid your house in the hunt of child pornography or something worse. It’s always the owner’s responsibility to make it as hard as possible to get access to his network. The Owner is always liable!

    I have invented some names for the sake of this. (There’s probably some other name for them but this is what I call them)

    Thrill seekers

    This is the most harmless ones, they just want to be able to

    Enjoying the preview?
    Page 1 of 1