Wifi Hacking Strategy & Ideas
By Mad76e
()
About this ebook
This book is written to those who dare to go one step further than just sitting still in an apartment with the neighbours connection
Read more from Mad76e
Basic Wifi Hacking Rating: 0 out of 5 stars0 ratingsBasic Hash Cracking Rating: 0 out of 5 stars0 ratings
Related to Wifi Hacking Strategy & Ideas
Related ebooks
Hacking Rating: 3 out of 5 stars3/5How to Hack Like a GOD: Master the secrets of hacking through real-life hacking scenarios Rating: 4 out of 5 stars4/5How to Hack Like a Pornstar: A Step by Step Process for Breaking into a BANK Rating: 5 out of 5 stars5/5Hacking: 10 Easy Beginners Tutorials on How to Hack Plus Basic Security Tips Rating: 0 out of 5 stars0 ratingsZero to Hacking: Zero Series, #1 Rating: 0 out of 5 stars0 ratingsHow to Hack Like a Legend: Hacking the Planet, #7 Rating: 5 out of 5 stars5/5Ethical Hacking: A Beginners Guide To Learning The World Of Ethical Hacking Rating: 3 out of 5 stars3/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5How to Hack Like a Pornstar: Hacking the Planet, #1 Rating: 5 out of 5 stars5/5Ultimate guide for being anonymous: Avoiding prison time for fun and profit Rating: 5 out of 5 stars5/5How to Hack Like a GOD: Hacking the Planet, #2 Rating: 5 out of 5 stars5/5Hacking for Beginners: Your Guide for Learning the Basics - Hacking and Kali Linux: Security and Hacking, #1 Rating: 5 out of 5 stars5/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Hacking into Hackers’ Head: A step towards creating CyberSecurity awareness Rating: 5 out of 5 stars5/5Cyber Security for Beginners: How to Become a Cybersecurity Professional Without a Technical Background (2022 Guide for Newbies) Rating: 0 out of 5 stars0 ratingsEthical Hacking Rating: 4 out of 5 stars4/5Deep Web Secrecy and Security: an inter-active guide to the Deep Web and beyond Rating: 4 out of 5 stars4/5Compsec: For the Home User Rating: 0 out of 5 stars0 ratingsHacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5The Darknet Superpack Rating: 0 out of 5 stars0 ratingsUltimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5Tor and the Deep Web Rating: 0 out of 5 stars0 ratingsComputer Hacking: The Crash Course Guide to Learning Computer Hacking Fast & How to Hack for Beginners Rating: 0 out of 5 stars0 ratingsDarknet Rating: 4 out of 5 stars4/5Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues Rating: 0 out of 5 stars0 ratingsProtect Your Personal Information Rating: 0 out of 5 stars0 ratingsThe Core of Hacking Rating: 0 out of 5 stars0 ratingsEasy Private Browsing: How to Send Anonymous Email, Hide Your IP address, Delete Browsing History and Become Invisible on the Web Rating: 0 out of 5 stars0 ratings
Computers For You
The ChatGPT Millionaire Handbook: Make Money Online With the Power of AI Technology Rating: 4 out of 5 stars4/5Procreate for Beginners: Introduction to Procreate for Drawing and Illustrating on the iPad Rating: 5 out of 5 stars5/5Elon Musk Rating: 4 out of 5 stars4/5Standard Deviations: Flawed Assumptions, Tortured Data, and Other Ways to Lie with Statistics Rating: 4 out of 5 stars4/5The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution Rating: 4 out of 5 stars4/5CompTIA IT Fundamentals (ITF+) Study Guide: Exam FC0-U61 Rating: 0 out of 5 stars0 ratingsDeep Search: How to Explore the Internet More Effectively Rating: 5 out of 5 stars5/5Slenderman: Online Obsession, Mental Illness, and the Violent Crime of Two Midwestern Girls Rating: 4 out of 5 stars4/5How to Create Cpn Numbers the Right way: A Step by Step Guide to Creating cpn Numbers Legally Rating: 4 out of 5 stars4/5Mastering ChatGPT: 21 Prompts Templates for Effortless Writing Rating: 4 out of 5 stars4/5The Invisible Rainbow: A History of Electricity and Life Rating: 5 out of 5 stars5/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5SQL QuickStart Guide: The Simplified Beginner's Guide to Managing, Analyzing, and Manipulating Data With SQL Rating: 4 out of 5 stars4/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Uncanny Valley: A Memoir Rating: 4 out of 5 stars4/5Alan Turing: The Enigma: The Book That Inspired the Film The Imitation Game - Updated Edition Rating: 4 out of 5 stars4/5101 Awesome Builds: Minecraft® Secrets from the World's Greatest Crafters Rating: 4 out of 5 stars4/5CompTIA Security+ Get Certified Get Ahead: SY0-701 Study Guide Rating: 5 out of 5 stars5/5Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Rating: 4 out of 5 stars4/5Learning the Chess Openings Rating: 5 out of 5 stars5/5Creating Online Courses with ChatGPT | A Step-by-Step Guide with Prompt Templates Rating: 4 out of 5 stars4/5People Skills for Analytical Thinkers Rating: 5 out of 5 stars5/5An Ultimate Guide to Kali Linux for Beginners Rating: 3 out of 5 stars3/5I Forced a Bot to Write This Book: A.I. Meets B.S. Rating: 4 out of 5 stars4/5The Professional Voiceover Handbook: Voiceover training, #1 Rating: 5 out of 5 stars5/5
Reviews for Wifi Hacking Strategy & Ideas
0 ratings0 reviews
Book preview
Wifi Hacking Strategy & Ideas - Mad76e
WiFi-Hacking Strategy & Ideas
Written by: Mad76e
Dedicated to a Community that disappeared
Started so well and ended with confusion!
"In the name of desperation
In the name of wretched pain
In the name of all creation
Gone insane
We're so fucked
Shit outta luck
Hardwired to self-destruct"
Copyright© 2018 by Mad76e
All rights reserved This book or any portion thereof may not be reproduced or used in any manner whatsoever without the express written permission of the publisher except for the use of brief quotations in a book review or scholarly journal
First printing 2018
ISBN 978-1-387-69426-6
Mad76e
Please note:
This book is written from a hacker’s perspective. Language, value and ideas may not be the same as the authors
Never do anything against another wireless network without the owner’s written approval. All of the content in this book is 100% legal to do as long as you have permit from the owner to do so. This book is NOT an invitation for you to commit crimes, therefore it’s in your interest to check with your countries laws what applicable.
Also a special note: Do not trespass!! In some countries it’s a high risk to get shot by the landowners if they find you trespassing on their property!
Introduction
Welcome back to a new book about the wireless hacking scene. This book however will not be about the actual keyboard commands; it will cover important stuff to know as tactical, planning, risk assessment and such. This is the lost art of WiFi hacking. Knocking commands in terminal windows is only one part of WiFi-hacking. Innovative solutions, and thinking outside the box are also a part of hacking. It isn’t good enough to just sit in a room with an antenna, there are limitations to that, and the strongest parabolic antenna can’t help you all the time. But as I use to say it all have to do what you want with WiFi hacking. This book is written to those who dare to go one step further than just sitting still in an apartment with the neighbours connection, which if you ask me is a risk!
Also I will go through some must have hacking gadgets and we may take a very short trip to look at cracking again, especially how to optimise your cracking. This is important, this can actually change everything.
Risk Assessment
Let’s first talk about risk assessment, and what that is. Why using this boring subject together with hacking you may ask yourself, and the reason for this is simple. If you ask me, this is something every hacker should use at least once a while, because it will probably save your neck at least a couple of times.
Simply put!
Risk analysis, involves systematically using available information to describe and calculate risks with a given system. Risk analysis assesses probabilities of various unwanted events and their consequences.
We want to do this to understand the risks and make a judgement call if it’s worth the risks. In our world we can see it like a minute or two of breathing and a last chance to go through the attack again in your head to see if it’s worth it. Have I thought things through? You don’t want to run headless in to something
I will not bore you too much with the details, most of it are self-explained
The events can actually be anything you feel comfortable with
It’s a basic formula. Risk = Likelihood x Impact, is typically used to compute a risk value. This formula is also known as a risk assessment matrix. By weighing the likelihood of an event against the level of damage it could cause, the risk assessment matrix is an illustrative tool for management to use to plan for possible disasters.
For example, we can use a scale of 0 to 10, in which 0 means the threat against the hacker is not likely to occur and 10 means the threat will absolutely occur. The impact 0 means there is no damage done against our hacker, whereas 10 mean the opposite, something that will make us to abort. Numbers in between can represent the result of a statistical analysis of threats.
Using the quantitative range 0 to 10, you may decide to assign qualitative terms to results (e.g., 0 to 4 = low risk, 5 to 7 = moderate risk, and 8 to 10 = high risk)
To simplify things, make 10 events and divide the result you get in the Risk
column. By doing that you will get an actual difference that we can use as a % value (mathematically incorrect but I think you get my point) the system here will just go to 100! Now low numbers mean high chance to succeed and high numbers doesn’t. However, likelihood has to be thoughtfully determined; you can’t just write down some low enough number. Also important is every individual risk, and make adjustment in your planning how to lower that Impact
and Likelihood
numbers.
Different kind of Wireless hackers
When talking about WiFi hacking, there are a couple of types, or category of hackers we’re talking about. Some of them are scarier than others. From a security point of view they’re all dangerous, because of what they might do inside your network. To shrug your shoulders and say "If they hack my wireless network and get access, so what; it's not that bad if they borrow it once a while" can be totally fatal for you as an owner. You don’t know a shit about the guy who uses the access point and in worst case scenario a lot of police cars will raid your house in the hunt of child pornography or something worse. It’s always the owner’s responsibility to make it as hard as possible to get access to his network. The Owner is always liable!
I have invented some names for the sake of this. (There’s probably some other name for them but this is what I call them)
Thrill seekers
This is the most harmless ones, they just want to be able to