

Think of packets like Lego building blocks. When data is transferred from one computer to another, it is broken down and sent in packets. Credit: Ī Packet is the basic unit/building block of data in a computer network. So let’s start from the basics: The Packet. This means you need to understand how the tech works in the first place. In order to hack something, you need to know how it works. Wether it's at school, home, or simply bingeing Netflix, it’s increasingly rare to see anyone carry out Internet related activities without it.īut have you ever tried to hack Wi-Fi? 🤔 (I’m sure you’ve been tempted 😏). Wireless Fidelity (Wi-Fi) is a common technology many of us use in our daily lives. How to put the network card into monitor mode.Here's a basic rundown of what this tutorial contains: You would be committing a crime and you'll either be fined, sent to jail, or just get your parents embarrassed.Īnd now that we have that lovely introduction out of the way, let’s proceed.🙃 What We'll Cover:

Do not under any circumstances, conditions, or influence of unwise friends use the hacks you learn here on organisations, individuals, or your probably annoying neighbour. In this article you are going to learn a basic Wi-Fi hacking procedure using those skills.ĭisclaimer: This is strictly for educational purposes only (and, of course, for a little fun). In my previous article, we talked about some basic Linux skills and tricks. Don't live in fear but proceed with caution.Welcome to the world of Wi-Fi hacking, everybody.

You want to limit attacks on you limit what goes out on the wire. My best advise is always proceed with the thought that anything you communicate over may be compromised. I think with enough reasonable security hygiene you can keep yourself out of harms way. I have too much understanding and even a greater imagination so its easy to get carried away with ones protection. I have spent a significant time in information security. I know in other countries these thoughts are quite scary and understandably so.

For me those things are not of great concern. I do believe you can use things like this to keep casual monitors away not state actors. I would suspect US entities like the NSA own some of the TOR infrastructure and other countries have likely done the same. For example I have used a TOR browser to proxy my way around various things however I would not trust that to protect my identity. Data on the wire with even the best encryption is only as good as the remote end. Privacy for data at rest is fairly easy to achieve. In my mind privacy refers data and anonymity refers to identity. Privacy and anonymity are two different animals.
