WIFI Hacking



First of all understand that what is WIFI .....

Wi-Fi is a wireless networking protocol that allows devices to communicate without internet cords. It's technically an industry term that represents a type of wireless local area network (LAN) protocol based on the 802.11 IEEE network standard.Wi-Fi is the most popular means of communicating data wirelessly, within a fixed location. It's a trademark of the Wi-Fi Alliance, an international association of companies involved with wireless LAN technologies and products.

  There are some apps for finding a vulnerability in LAN Connection using Smart Phone.
   1) Wibre +
   2) WPS WPA Tester
   3) WPS Connect and much more available on internet.

and there are three type of attacks are use to hack the wifi password.
1) Dictionary Attack
2) BruteForce Attack
3) Apps with some Algorithm for Attack

1)  Dictionary Attack:
      A dictionary attack is based on trying all the strings in a pre-arranged listing, typically derived from a list of words such as in a dictionary (hence the phrase dictionary attack).[1] In contrast to a brute force attack, where a large proportion of the key space is searched systematically, a dictionary attack tries only those possibilities which are deemed most likely to succeed. Dictionary attacks often succeed because many people have a tendency to choose short passwords that are ordinary words or common passwords, or simple variants obtained, for example, by appending a digit or punctuation character. Dictionary attacks are relatively easy to defeat, e.g. by using a passphrase or otherwise choosing a password that is not a simple variant of a word found in any dictionary or listing of commonly used passwords.

2) BruteForce Attack:
      
A brute force attack is a trial-and-error method used to obtain information such as a user password or personal identification number (PIN). In a brute force attack, automated software is used to generate a large number of consecutive guesses as to the value of the desired data. Brute force attacks may be used by criminals to crack encrypted data, or by security analysts to test an organization's network security.
A brute force attack is also known as brute force cracking or simply brute force.
 3) Algorithms For Attack
    
      In an application developer use some algorithms to crack the passwords  like Zhaos algorithm, Thomson Default key algorithm,and much more...     

Comments

Popular Posts