Welcome, Guest: Register On Nairaland / LOGIN! / Trending / Recent / New
Stats: 3,152,157 members, 7,815,029 topics. Date: Thursday, 02 May 2024 at 05:31 AM

How Can I Be Hacked On A Public Wifi? - Computers - Nairaland

Nairaland Forum / Science/Technology / Computers / How Can I Be Hacked On A Public Wifi? (782 Views)

Can Gotv Be Hacked? / How To Protect Your Privacy On Public Wifi Networks? / Disable Windows Print Spooler Or You Could Be Hacked, Says Microsoft (2) (3) (4)

(1) (Reply)

How Can I Be Hacked On A Public Wifi? by Christianbuka20: 7:47pm On Oct 01, 2019
How can I be hacked on a public wifi?

If you follow the steps above, then you should be able to stay safe while using public wifi. However, it’s good to know what you’re up against. In this section, we’ll take you through some of the methods hackers deploy to steal your data.
1. Man-in-the-middle attacks
Hackers use this technique to intercept communications between two entities, such as your device and the server it’s connected to. The flow of data is interrupted by the snooping hacker, allowing them to eavesdrop on your personal information and steal things like bank account information and credit card details.
Man-in-the-Middle (MITM) attacks are particularly prevalent on public wifi networks. Hackers set up rogue wifi networks with seemingly innocuous names such as ‘FreePublicWifi’ in a bid to lure users. Once you’re connected, the hacker will have direct access to your browsing session and all the data contained within. They might even be able to view your stored cookies, or bite-sized packets of data that store things like login information.
The effectiveness of MITM attacks was showcased by 7-year-old ethical hacker, Betsy Davis, who successfully infiltrated a public wifi network in under 11 minutes. A survey carried out as part of the demonstration revealed that 59 percent of British internet users frequently connect to public hotspots, with 19 percent of them using public wifi for sensitive transactions like personal banking.
One way to identify a rogue connection as opposed to a legitimate one is to check for authentication/login procedures. Trustworthy networks will usually ask for some personal details and for you to agree to a ‘terms of service’ before granting you internet access. If a network allows you to login immediately without the need to punch in any data, that’s usually a red flag and the network should be avoided.
2. Packet sniffing
A packet sniffer is robust software that’s used by system administrators to monitor network traffic. With its help, an administrator ensures smooth flow of traffic by removing all bottlenecks on the network.
But there’s a downside. An intruder with malicious intent could infiltrate the software and use it to analyze all the traffic in the network. The purpose is the same: to steal personal information such as passwords, user IDs, and credit card information. However, intruders can remain invisible while they steal this data, so packet sniffing is generally viewed as a dangerous attack to quell.
There are three ways to carry out a packet sniffing attack. The first one is referred to as wireless sniffing, and involves a hacker gaining control of the system after forcing their way through the network. Some companies unwittingly make this process easier by forgetting to change the default admin settings on their routers.
Another way is for an employee of the firm who has access to the internal LAN to abuse his privileges to capture traffic. The last method involves the use of spoofing techniques by hackers outside the target network. Such techniques break through the firewall and make it possible to steal information.
3. DNS spoofing
DNS servers help manage the flow of internet traffic to and from your device. For example, when you enter ‘facebook.com’ on your browser, it first contacts its DNS server. The server then responds with IP addresses that your device can use to connect to Facebook. It’s basically helping convert human-readable domain names to computer-readable ones.
DNS servers can turn malicious if a hacker gains access and changes some of the information. The server could be instructed to redirect common domain name requests such as ‘google.com’ to a site that the hacker owns and controls. In this case, you come become a victim of a phishing attack (see below).
Such types of hacking attempts can be devastating on public networks. A hacker only needs to infiltrate one computer in order to disrupt the dozens of devices that are connected at any given time.
4. Phishing scams
Phishing attempts are used by hackers to obtain sensitive personal information such as your bank account details or credit card information, often for the purpose of stealing money. They’re usually disguised as links within official sounding emails or other modes of communication, prompting users to fork over details.
In 2015, Australian comedian Casey Talbot was robbed of over US$10,000 from his personal bank account while connected to public wifi in Sydney airport.
Hackers first infiltrated the network and then proceeded to target his particular device via a malicious email. Mr. Talbot fell for the trap and handed over his information. The money was cleaned out immediately.
As a general rule of thumb, we reiterate that you should avoid any sort of financial activity over public wifi

Comments
Click Here:https://christechnics..com

(1) (Reply)

Apple Macbook Laptop A1181 (late 2007) Wholesale Sale Out!!!!! / Getting A New Laptop Or A Used One With Better Spec: Which Is Better? / Hp Pavilion 15 Gaming Laptop Nvidia Geforce Gtx 1050

(Go Up)

Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health
religion celebs tv-movies music-radio literature webmasters programming techmarket

Links: (1) (2) (3) (4) (5) (6) (7) (8) (9) (10)

Nairaland - Copyright © 2005 - 2024 Oluwaseun Osewa. All rights reserved. See How To Advertise. 14
Disclaimer: Every Nairaland member is solely responsible for anything that he/she posts or uploads on Nairaland.