Beware the Airport Wireless 120
schwit1 writes to tell us that a recent study by a Silicon Valley-based security company shows that black-hats have been ramping up their use of tempting free or unsecured wireless access points in high travel areas like airports and hotels. "According to their study, even the 'secure' networks weren't all too safe. Eighty percent of the private Wi-Fi networks at airports surveyed by Airtight were secured by the aging Wired Equivalent Privacy (WEP) protocol, which was cracked back in 2001. Almost as many — 77 percent — of the networks they surveyed were actually private, peer-to-peer networks, meaning they weren't official hotspots. Instead, they were running off someone else's computer."
Re:Old (Score:5, Funny)
I cracked my own network in minutes using this method [lifehacker.com]. Can someone point me to a less complicated method?
When I need to get into just about any secure network, this hacking multitool is what I use: CB G.Freeman [ndswebservices.com].
It can crack arbitrarily high amounts of encryption when applied to the proper segment of the network. It works very well, often only taking seconds to provide you with the authentication you require. It also can do wonders on conventional locking systems.
Enjoy!
Re:Get to work! Here's how to crack WEP networks (Score:4, Funny)
Connect to your wireless router via Ethernet and click the 'Show Password' checkbox?
Re:Get to work! Here's how to crack WEP networks (Score:3, Funny)
"I cracked my own network in minutes using this method [lifehacker.com]. Can someone point me to a less complicated method?"
Look for the PostIt on the bottom of the router. Or try the password on the PostIt on the underside of the keyboard - but only if the password on the PostIt on the monitor doesn't work.
Re:they were running off someone else's computer (Score:1, Funny)
My Windows laptop has the Bonzai Buddy firewall you insensitive clod.