Aim : To bypass a wireless network and document the same.
Requirements :
pc, or a laptop, wireless router
Description : Hacking is art of exploiting any found vulnerabilities pertaining to hardware or
software by applying necessary skills and tools. Using the acquired knowledge to cause damage or steal any kind of information is considered as unethical hacking and on the contrary aiding in protecting from such malicious activities with prior consent is termed as ethical hacking. Wi-Fi hacking is the procedure of bypassing the security protocols and gaining access for defamatory purposes. Such activities are usually carried out by a Black hat hacker. Attackers usually perform an information gathering before launching the actual attack to precisely identify the vulnerabilities present with the target. This preliminary phase is called as reconnaissance. A wireless network is nearly vulnerable either due to poor authentication configuration or due to its inherent security protocols. The next step is to assesses all the possible vulnerabilities associated with the network. This is the vulnerability assessment phase.
Share with your friends: |