Fixxx
Moder
- Joined
- 20.08.24
- Messages
- 267
- Reaction score
- 494
- Points
- 63
Wi-Fi networks have become so ingrained in our lives that many users perceive them as something as essential as electricity from an outlet. They can be found everywhere: in private homes, cafes, shopping centers, offices, public transport and even outdoors, turning your phone into a hotspot. However, few realize that Wi-Fi can be a vulnerable point through which cybercriminals can gain access to your devices.
In the case of home Wi-Fi malicious actors may be interested in accessing personal data such as passwords, bank accounts or personal information. Additionally, hackers can use a compromised home Wi-Fi for unlawful activities online such as downloading pirated content or conducting cyberattacks on other computers. Regarding business Wi-Fi networks, cybercriminals may seek access to a company's confidential information such as accounting data, client information or trade secrets, as well as disrupt business operations. This can lead to serious consequences including data breaches, financial losses or damage to the company's reputation.
How Wi-Fi hacking happens?
There are cases where a neighbor in your building or office simply doesn't want to pay for their internet and tries to use someone else's. Their goal is not to cause harm so they only need to know the router's password. Typically, they use programs or applications for Wi-Fi hacking. It should be noted that gaining unauthorized access to someone else's network is illegal so these programs are legally used only for testing one's own network. Wi-Fi hacking software uses full password guessing, also known as a brute-force attack. The program tries all possible combinations of numbers and letters to guess the correct order. The more complex the password - the longer it takes to crack.
Nowadays, Wi-Fi hacking has significantly diminished in relevance with one of the few cases being gaining access to a network for further compromise. It's worth mentioning "neighborly" hacking where your neighbor uses your internet for free. Earlier Wi-Fi hacks were more about intercepting traffic possibly altering internet page content and so on. Today such attacks for the most part have declined due to the widespread adoption of session encryption. A prime example is HTTPS. For instance, if your website lacks an SSL certificate Google will rank it lower in its search results. Or if a browser detects any irregularities with the certificate verifying integrity it will promptly notify you and prevent opening the webpage's content. Your router holds much greater value for cybercriminals today than your Wi-Fi network.
In apartments, all smart devices, tablets, computers and smartphones are typically connected to the router. All home network traffic passes through the router. Therefore, gaining access to it opens up many opportunities for cybercriminals. For example, a hacker could not only steal your data, spy on you and eavesdrop but also use your devices to launch DDoS attacks on websites or engage in covert cryptocurrency mining.
When it comes to Wi-Fi hacking in private apartments it's often done for fun. Because it's often quite easy to do, curious individuals after watching a YouTube video or reading an article online, attempt to attack someone's Wi-Fi. However, the impact of such mischief is limited - at most they can access a neighbor's Wi-Fi. I believe it's more interesting to discuss hacking the wireless network of a company. Here the intentions of cybercriminals are not always serious. I rarely hear of data breaches occurring through Wi-Fi hacking. In most cases, hackers target what is easier to compromise remotely. Only very determined cybercriminals would specifically visit a company's offices. As of now, we don't see frequent company breaches through Wi-Fi.
If the password cannot be cracked cybercriminals may attack the network using security protocol vulnerabilities. For instance, not long ago hackers used Key Reinstallation Attacks (KRACK) to exploit a vulnerability in the WPA-2 network security technology. In 2024 two vulnerabilities were discovered: in the Wpa_supplicant software and in the iNet Wireless Daemon (IWD).
There is a difference between business routers and home routers often not in favor of security. Among the numerous wireless networks it's easy to spot a corporate access point by its name. For example, Cisco - which wouldn't be used at home. Most attacks that target home routers are applicable to corporate devices as well. However, corporate access points have their characteristic vulnerabilities such as capturing PMKID and issues with WPA Enterprise (a mode meant to provide enterprise-level security). This is due to the complexity of settings for corporate routers. A typical physical perimeter doesn't consist of just one or two corporate Wi-Fi networks (Corp and Corp-Guest). Wireless networks comprise numerous different service networks where routers from home vendors with all their vulnerabilities might be encountered. For example, printers often have their wireless networks. Additionally, users themselves can share Wi-Fi from their phones which can be a potential entry point into the company's IT infrastructure. Wireless networks are not limited to Wi-Fi alone. Wireless mice, keyboards - often they are not secure and access to user's computers can be gained through them.
One way to access a user's device is to create a fake access point.
User devices store data of previously known Wi-Fi networks for convenience in reconnecting to them. This convenience has a downside - the device becomes vulnerable to attacks with SSID spoofing. The main danger is that the device will likely send data through the fake point to applications that usually transmit data through legitimate Wi-Fi connections, making this information available to the cybercriminal. The further development of the attack after establishing a connection to the fake access point on your device depends on the vulnerabilities of the device itself and its software. Access to a network can also be gained using social engineering tactics.