TheWi-Fi network securityIt is a topic that worries both novices and professionals, and both types of users have something in common:They know that a Wi-Fi network must be secure.And for this we hide the identity of our network through the tools provided by the router and use passwords, in addition to many other measures that often have more reassuring value than a true security value.
However, despite all the measures we can take, we may not be as sure as we think. Outside there are many unscrupulous people who want to take our WiFi signal, either to be able to connect to the internet for free or to access our system and from there to our devices, in order to find out something with which to be able to harm us.
If you want to be prepared to face any security threat in our WiFi network, do not stop reading this post, where you will find a lot of information to navigate and perform our daily activities with total security that nobody is spying on us.
Is it easy to hack a WiFi connection?
As one of the first measures that we have to take, it is necessary that we really learn which of the security measures that we can implement are effective or not, that is, if they really serve when stop the attack of a trained hacker.
That is why from this point, we will show you the security measures in more common and widespread WiFi networks among users, and we will comment which of them really are useful for avoid or reject a hacker's attack and which serve simply for users without much knowledge.
a) Network SSID hiding
Security throughthe obfuscation procedureIt has been a long time since it has been crossed, to such an extent that anyone with a minimum level of knowledge and the right toolsYou can access our hidden network.
The only users who will truly be harmed in the case of applying this method are the legitimate users of this network, that is, all those who use it for their daily tasks,which cannot see us when they try to connect with their computers.
But for the hacker it?s not a problem,with your tools you have already been able to identify our networkand he is putting hands to work to access it. The only thing he needs is the password, which is why we must place special emphasis on creating a good password.
b) WEP passwords
Type passwordsWEP (Wired Equivalent Privacy),best known for its translation into SpanishWired Equivalent Privacy It is a fairly old way of providing security to a wireless network.
Unfortunately, while they are easy to configure,the hundred is that they are extremely simple to decipher,it is only enough to use specialized software tosniffnetwork traffic around the device. You can even find in the router market thatwill automatically decrypt any wireless network protected with WEP passwordsto relay and reuse it.
In this case, the best advice that can be given is never to use passwords of this type, since we could be at serious risk. Insteadwe should always use passwords of the WPA2-PSK type,They provide much greater security. If our devices do not have WPA capability, it is best to get rid of them and modernize with routers that are compatible with the WPA standard.
c) WPA passwords
If we think we are protected by a long, complicated passwordand a security of the WPA2-PSK typeIt is the safest thing in the world, we are one step away from being completely wrong. WhileWPA2 type passwords are strong and very secure,Our security can still be compromised.
Few know that most modern routers include a technology calledWPS (Wi-Fi Protected Setup),a methodology developed by the Wi-Fi Alliance forsimplify and facilitate the creation and configuration of secure WPA2 networksin the domestic or small office.
This allows the user to press a button on the router or enter an 8-digit password to connect devices such as Wi-Fi or other printers without difficulty to the wireless network..In the case of the password, it can usually be printed on the packaging, manuals or on the router itself. What is achieved with this methodis to avoid the use of long passwords for such connection.
Unfortunately,This is the point that hackers have selected to develop their attacks,since an important vulnerability has been found. Although several methods have been put into practice to counteract this failure, such as a pause of sixty seconds every 3 failed attempts, which will allow the attacker to take 7 years to break the security of our network.
But the truth is that cybercriminals have found other methods that will allow the hacker to enter our wireless network in just a few hours,taking advantage of the fact that not all manufacturers have implemented such solutions.
Returning to the topic ofWPS technology,first cause of this problem,on some Wi-Fi routers it is still an indispensable requirement for authentication,and is enabled by default.
So what we can do to avoid inconvenience iscompletely disable the WPS optionmaking sure that another one is not set automaticallyWPS PINinternal that produces some kind of security problem.
Another thing we can also do isdisable Wi-Fiand instead use a wired connection, which while it is somewhat extreme, can give us the protection we are looking for. Obviously it is not always possible to perform this procedure, but at leastWe will cut the times that a possible attacker has available to try to access our network.
Procedures for the most experts
The following procedures are not recommended for those users who do not have enough experience in this type of activities. In the event that we are not sure that we can successfully carry out the operation,it is best to resort to a computer technician, who can solve the problem,in exchange for obviously a small monetary reward.
Router Firmware Update
Therouter firmware updateIt is a practice that can give us a good result to put a stone in the wall of security. To know if our device has an update for its firmware, check the manufacturer's website.
Installation of other firmwares
Another of the alternatives we have availableis to replace the router firmwarewith tools like TomatoyDD-WRT, quepodrn improve the capacity and security of any router based on Broadcom chips.
As we have been able to observe through the reading of this article, to pretendthat a Wi-Fi connection is completely secure is a utopa,since there are too many elements at stake that conspire so that a network is easy enough to attack.The best thing is obviously not to use Wi-Fi,but this is not a very wise or technical advice, since technology aims to release us from the cables that originally made computing what it is today.
One last tip that if we have to take into account is simply to be careful with some aspects such as where we connect and from where we access our data and accounts, and of course not to disseminate our information too private through the network.
The dangers of hacking a WiFi network
It seems that not only who is the victim of Wi-Fip suconexin theft can be damaged, but also those who steal it. Computer security experts say that currently steal bandwidth on an Internet connection via Wi-Fi,It is an activity that can be compromising for both the thief and the stolen.
Currently many common users and without too much knowledge in computer science make the mistake of wishing to obtain certain advantages when accessing an Internet connection goes Wi-Fi without paying for it, but it is very important to know exactly who owns the network to which that user access,since a free internet connection could become a trap set there to steal your own data and credentials, with which they could have access to a wide range of private information that could be used against them.
That is to say,that these types of connections may be open for the purpose of facilitating the work of cybercriminals, given that once the unsuspecting and bold user accesses said network, they may immediately be subject to a deep analysis by hackers, who may spy on their communications, email passwords, chat, and most important of all , you may have access to all bank information such as credit card numbers and PIN numbers.
In addition, it should be noted that it could also infect your PC with some type of Spanish software, with which you can remotely know your movements even if the user has left the network.
Obviously the main recommendation is not to sneak into any network, and for those users who have a legitimate connection the advice isuse Wi-Fi routers with WPA and WPA2 encryption systems, good passwords, subnetting and use MAC filtering.
How to know if they are hacking my WiFi?
As we well know Internet users,the first line of defense for our Wi-Fies network encryption, which encodes the data transmitted between the computer and the wireless router. This method is the most used to prevent other users or hackers from using our network for free or for illegal purposes.
But nevertheless, For many well-trained hackers, encryption is a simple step to skip, especially if they have the time and resources necessary to do so, and once they have entered our system, they are free to navigate it wherever they want.
In these cases, if we are sure that there is some kind of suspicious movement in our network Wifi, is to try to know exactly which devices have entered it, with which we can establish if our security has been violated.
To Know if someone has entered our WiFi network without permission, We have the services of Wireless Network Watcher, it is a small free utility that is capable of scan our wireless network and show us a detailed list of all the equipment and devices that are connected to it, which allows us to easily and quickly find any other equipment that is currently connected to the network.
This spectacular software gives us very useful results, since for each device or computer connected to our network,The application will show us the IP address, MAC address, the company that manufactured the network card and, optionally, the name of the device.
All this information flow we canexport it to different formats such as HTML, XML, CSV and TXT in order to study them in more detail.
Best of all, besides it is free, is thatWireless Network Watcher does not require any installation. To start using it, the only thing we have to do is download it to our computer, extract the executable file from the zip file, and click on it to run it.
Of coursethe utility can only scan the wireless network to which we are connectedand other wireless networks cannot be scanned.
Notably Wireless Network WatcherIt is compatible with Windows XP, Windows 2000, Windows Server 2003/2008, Windows Vista, Windows 7 and Windows 10.
If you wish, you can download the application from its official site by clicking on this link.
How to protect my WiFi from hacking?
As we could see, the security of a WiFi network is not an issue that should be taken lightly, since the price we must pay to be trusted or underestimate this issue may be too high.
Stop if we take a series of collections on what is refers to the configuration of our Wi-Fi network, we can prevent other people from taking advantage of the lack of system security and using our Internet connection. But first we must detect these intruders.
To do this, from this point, we will know everything we must do to Protect our WiFi network from hackers and cybercriminals. Also, we will also present a series of tools that can help me improve the performance and operability of the network.
While there is really nothing more comfortable than having a Wi-Fi network in our home, and in this waybe able to connect to all our devices and computed with no need for wiring,The truth is that one of the most frequent failures in this type of connection distribution system is usually security.
It is important to note that one of the most significant features of Wi-Fi networks is that in generalthey tend to serve potential intrusions from external and unauthorized users.
If when creating a Wi-Fi network system in our home or office we have forgotten to activate encryption to prevent intruders, it is likely that those who reach the connection will start using part of our band without authorization to access the Internet.Even in some cases, even if the connection has encryption, it can happen that another external user hangs from our connection for various reasons.
Given the possibility that someone is stealing us WiFi connection, we must be attentive to prevent this from happening,or to eliminate this intruder, since the only people affected in this matter will be us, because the greater the number of users using our network, the slower the usual browsing will be.
How to detect intruders in our Wi-Fi network
As we already mentioned,Wi-Fi networks have to be more vulnerable than conventional networks,Therefore, when installing such a network it is necessary to take certain precautions.
However, it may happen to us that even so, Someone intruder hangs on our Internet connection, causing us a detriment to the connection performance. That is why it is extremely important to know how to recognize the most frequent symptoms that may occur before the appearance of an intruder in our network.
One of the most frequent symptoms is the perception of a noticeable change in connection speed, which may be evident during any download that we are making from the Internet, or simply during browsing. The first thing we should do to detect intruders is carefully observe the behavior of our Wi-Fi router,in order to detect abnormal activities.
To do this, it is advisable to turn off all the devices and computers we have at home, or disconnect them from the network.Once we have disconnected all the equipment, we must observe the lights of the different indicators of the router.
If we see that even with the devices not working, a series of rapid and continuous flashes occurs, then we are faced with the presence of an intruder in our network, since this demonstrates that there is some remote device that is connected and carrying out a transmission of information flow.
Tools to detect intruders in Wi-Fi networks
In addition to Wireless Network Watcher, a app to detect intruders in the network Wifi mentioned above in this same post, one of the most recommended elements to detect intruders in our Wi-Fi home network is to use a Internet connection speed meter,which allows us to discover whether or not there is a true loss of bandwidth.
As we all know,the presence of an unauthorized user in our network inevitably cause it to result affected download speedWe can achieve with our Internet connection.
We can also find the case to discover our blocked IP in download sites, as the popular Mega, because perhaps the intruder is currently downloading material, taking advantage of our connection and our IP address.
To detect this type of inconvenience, there is a wide variety of computer tools, such asBASpeed, undoubtedly one of the best in this aspect, which allow us know exactly the download speed and in this way confirm the intrusion if it is occurring.
You can downloadBASpeedby clicking on this link.
There are also tools that are purely and exclusively dedicated hunting for intruders in WiFi networks, as is the case of AirSnare. This application works by listening to the traffic that is transmitted through the network adapter, and obtains all MAC addresses connected to our local network.
With this the intruders are quickly detected. You can download AirSnare by clicking on this link.
With a series of special tools, it is possible easily detect the presence of intruders in our home Wi-Fi network, which must be eliminated to avoid inconveniences with our broadband connection.
In this sense, a tool that provides very good results in this regard isZamzon Wireless Network Tool, which has the peculiarity of being really simple and at the same time very effective.
Basically,Zamzon has the same function as the aforementioned AirSnare, but it does not have all the options that this program includes, that is to say that tasks such as message delivery or event logging have not been included, which is definitely not the primary objective for which we install the program.
But nevertheless,Note that AirSnare is much more complete than Zamzon,since it also includes a series of really useful features, such as the issuance of announcements with sound every time you discover an unknown IP address connecting to the network.
AlsoWe can detect the presence of unauthorized users to our networkthrough the control panel of our router.
Once we have confirmed the presence of unauthorized users in our private Wi-Fi network,We must then consider the need to maximize its security system.
Techniques to prevent intruders in the Wi-Fi network
Have we detected an intruder in our Wi-Fi network?Do not despair, as we can implement a series of security measures to prevent re-entry. We have already seen that there are various ways to protect ourWireless Internet connection, many of which are useless measures, since a group of tools developed to generate vulnerability in Wi-Fi networks is also available.
However, there are also a number of methods that offer good results in this regard, and are usually recommended for those who have detected the entry of intruders into your Wi-Fiprivada network, O wellto prevent this from happening.
Next we count what are the security measures that work and allow us protect our internet connection:
to) Change the router password
We have barely found that an unauthorized user is taking advantage of our wireless connection, the first thing we should do ischange router password. In this way, if, for example, the intruder tries to download material through a P2P application using our connection, he will not be able to do so, since he does not know the password that the router will request to perform this task.
b) WPA / WPA2 encryption
In principle, it should be noted that the WPA encryption technology, which is fully compatible with 802.11g or higher adapters,It is stronger and more secure than WEP encryption. In this sense, the most robust is usually WPA2-AES, which has a wide variety of router models today.
c) Anti-WiFi paint
Although it is not yet available worldwide, the truth is that in some countries the new anti-WiFi paint, manufactured by the Pilkington company, has been tested, which so farIt has provided very good results.
Useless security measures in Wi-Fi networks
For protect our home Wi-Fi network from intrusion of possible unauthorized users, there are a number of measures that we can put into practice, although it is important to know which offer good results and which are useless.
Once we have verified that there is aintruder in our Wi-Fi networkit is necessary that we begin to use a series of methods that will prevent this from happening, and even that more and more unauthorized users will take advantage of our connection.
While there are various safety techniques to avoid being harmed,the truth is that many of them do not provide the expected result,So our Wi-Fi network continue to be vulnerable.
Here are some details about thesecurity methods that are uselessWhen it comes to protecting access to the wireless network:
a) Router shutdown
When detecting the presence of an intruder, many users turn to the simplest measure, turn off the router. While it is true that through a router that is turned off it is impossible for intruders to seep into our network, it is also true that we cannot use it, and turning it on again Intruders will access the connection without any inconvenience.
b) WEP encryption
This is a measure that has become obsolete,since most users know applications such as Aircrack,which consists of a tool that allows you to find WEP keys quickly.
c) MAC filtering
As with the previous case, there are special applications, such as the MacMakeUpro case,whose function and change the address of the device in seconds, and that in many cases causes the owner of the network to be out of it.
d) SSID concealment
This is the method of hiding the name of the wireless network, which is useless, since anywayThose looking for a free internet connection via Wi-FiThey will detect us the same.