How To Protect Or Hide Yor IP Frpm Hackers
Live/Persistent: a
mode that an operating system can be in where it can be booted from a
non-permanent device on a machine such as a CD or in the case of
persistent mode where it is booted from a USB drive and can be edited.Aircrack-ng: software executed in a terminal on Linux to allow users to hack into surrounding wireless networks.Skid: a
person that uses technology pretending they know how to use it but
don’t really know how, basically a slightly more professional way to say
a noob.Type
3 packet sniffing: black hat/wireless cracking, is the most commonly
abused category of all packet sniffing types because it’s the easiest to
do, and is the most useful I think. I recommend you read the previous
posts on packet sniffing before continuing.
Usually
packet sniffing is performed by a Skid using an operating system called
backtrack in either live or persistent mode. They would start up
Terminal and type in a series of commands out of the Aircrack-ng
library. Most likely the Skid would search on YouTube “how to crack
wireless” or something along those lines. Once the Skid has found the
video the Skid would then watch/follow the video to hack the wireless
network without knowing what he actually doing .
- How can I Protect my Wireless?
When
it comes to protecting yourself from these types of attacks there is
actually no way to be 100% safe but you can get 99% of the way there. By
upgrading your wireless router/modem to a device that supports WPA2 and
using randomly generated non-dictionary 26 character long password
including capitals lowercase numbers and symbols it will make it almost
impossible to hack by brute force and the new WPA2 technology is way
more resistant to algorithmic methods of decryption. You may be told
that setting your router in different modes can protect you but there’s
always a way around the mode you set. For example turning off
Promiscuous Mode (doesn’t allow external packets) but by simply just
using the Mac address spoofer the hacker can get right past that. So
basically there’s no real way to protect yourself from these types
attacks with any certainty .
- Can I Detect if Someone’s Using my Internet?
Most
of the time you can detect if someone is using your Internet by using
wire shark software and by packet sniffing your own network as I
explained in my earlier posts. If the hacker knows what he’s doing he
would be VPN tunneling through your network. The reason why you can’t
detect the VPN tunneling is because he could make it look like it’s your
antivirus updating or your Windows update or something but a conflict
arises because of not updating your network. Most of the time these
exploits include Java, software that updates and other things that don’t
even make sense but you don’t question if you don’t have enough
knowledge. So I guess if you know what you’re doing and protecting your
network, you should be able to detect when someone is VPN tunneling
you. There will be of no for sure way to tell but their activity might
look a little suspicious. For example if your antivirus was updating
24/7 that would be a flag. Back in the old days, 2005 or earlier, it
would be possible to boot up a live OS like backtrack or some other
Linux and then wire shark your network and turn off all the devices in
your house and only the hackers activity would show up but nowadays even
your router is contacting places for updates which would show up in
your wire shark so the hacker could hide in that stream. For example if
you have a Bell router it is constantly streaming information to Bell
even if you are not doing anything.
0 comments:
Post a Comment