Saturday, October 8, 2011

Wi-Fi (Wireless Fidelity)

Wi-Fi (Wireless Fidelity)
Wi-Fi (Wireless Fidelity) is a wireless connection such as mobile phones using radio technology so users can transfer data quickly. Wi-Fi not only be used for internet access, Wi-Fi can also be used to create wireless networks in the enterprise. Because of that many people associate with Wi-Fi "Freedom" for Wi-Fi technology gives freedom to users to access the Internet or transfer data from the meeting room, hotel rooms, campus, and cafes are marked "Wi-Fi Hot Spot".
Wi-Fi was originally intended for the use of wireless devices and Local Area Network (LAN), but now more widely used for accessing the internet. This allows anyone with a computer with a wireless card (wireless card) or personal digital assistant (PDA) to connect to the internet using access point (otherwise known as hotspots) nearby.specification
Wi-Fi is designed based on the IEEE 802.11 specification. Today there are four variations of the 802.11, namely: 802.11a, 802.11b, 802.11g, and 802.11n. B is the first product specification Wi-Fi. Variations of g and n is one product that has the most sales in 2005.
Specifications Wi-Fi

Specification

Speed

FrequencyBand

Suitablewith
802.11b

11 Mb / s

2.4 GHz

B
802.11a

54 Mb / s

5 GHz

A
802.11g

54 Mb / s

2.4 GHz

b, g
802.11n

100 Mb / s

2.4 GHz

b, g, n

Technically operational, Wi-Fi is one variant of communications and information technology that works on the network and the WLAN (wireless local area network). In other words, Wi-Fi is a certification trademark given to manufacturers of telecommunications equipment (the internet) working on a WLAN network and interoperates capacity already meet the required quality.
Technology-based Wi-Fi internet created and developed a group of U.S. engineers who worked on Electronis Institute of Electrical and Electronics Engineers (IEEE) standards based on technical devices numbered 802.11b, 802.11a and 802.16. Wi-Fi devices are not only able to work on WLAN networks, but also on the network Wireless Metropolitan Area Network (WMAN).
Due to technical device with a standard 802.11b WLAN devices intended for use at a frequency of 2.4 GHz or commonly called frequency ISM (Industrial, Scientific and edical). As for the technical standards of 802.11a and 802.16 WMAN destined for the device or also called Wi-Max, who works in the vicinity of 5 GHz frequency band.
Advantages of Wi-fi
The high public interest, particularly among the community of Internet-using Wi-Fi technology because at least two factors.
1) ease of access. This means that users in one area can access the Internet simultaneously without the need to be bothered with cable.
2) users who want to do surfing or browsing news and information on the Internet, simply bringing the PDA (pocket digital assistance) or Wi-Fi enabled laptop into a place where there is access point or hotspot.
The proliferation of hotspots in places such-which was built by telecom operators, Internet service providers, individuals and even triggered a second factor, namely because of the relatively inexpensive construction costs or only around 300 dollars U.S.. Also one of the advantages of Wi-Fi is the speed a few times faster than the fastest cable modem. So Wi-Fi users no longer have to be in the office space to work
Wi-Fi Hardware
Wi-fi hardware on the market currently exists in the form
Wi-fi in the form of PCI Wi-Fi in a USB form
There are 2 modes of Wi-Fi access, which is
Ad-Hoc
This connection mode is a mode where multiple computers are connected directly, or better known as Peer-to-Peer. The advantage, cheaper and more practical when connected only 2 or 3 computers, without having to buy an access point
Infrastructure
Using the Access Point that serves as a regulator of the data traffic, allowing many clients can connect to each other via a network (Network).
Weakness on wifi
Easily dihacking by hacer to steal user passwords wi-fi
The way is as follows:
First we must know the difference between network Hubs and Switches:
* The network hub of all data flowing on the network can be viewed / picked up by any computer on the network computer asalakan requesting such data, if not requested it will not come.
* In just a computer network switches which exchange of data that can see the data, others are not entitled komputer2 requesting the data.
The problem is the price of routers hubs and switches do not differ much, so most places are now using the switch that makes it difficult for network hacking.
This hacking technique:
* Sniffing
* ARP Poison Routing
Both techniques above will not be prevented by any firewall on the victim's computer, guaranteed.
Important Note: ARP Poison Routing can cause denial of service (dos) on one / all the computers on your network
Pros:
* It will not be detected by the firewall types and any series because of its weakness lies in not on the computer network system
* You can steal any type of login passwords that pass through HTTP server
* Can people steal all the login passwords on the network hub for the program is activated
* To ARP Poisoning can be used to steal passwords on HTTPS
* All programs free
* To network switch must be in the ARP poisoning one by one and your bandwidth will be consumed much for it (if inet super fast ga problems)
* Caught / network admin not by outside my responsibility
Start from here assume that the network in this story there are 3 computers, namely:
* Computer Victims
* Computer Hacker
* Server
The first steps:
1. Check your network type, you are on a network switch / hub. If you are on a network hub thankful because the process of hacking you will be much easier.
2. Download the necessary programs that Wireshark and Cain & Abel.Code:
http://www.wireshark.org/download.htmlhttp://www.oxid.it/cain.html
How to use Wireshark:
* Run the program wireshark
* Press Ctrl + k (capture and then click option)
* Make sure the content on your interface is Ethernet Card that led to the network, if not replace, and make sure also that the "Capture packets in promiscuous mode" on
* Click the start button
* Click the stop button after you are convinced that a password is entered selamaanda pressing the start button
* You can see all kinds of incoming and outgoing packets on the network (or on your computer only if your network is using a swtich
* To analyze the data right click on the data you want in the analysis and click the "Follow TCP Stream" and congratulations to analyze the package (I will not explain how because I can not)
* What is clear from the data contained therein must informasi2 entered the victim to the website and vice versa
Way above applies only if your network is not a switch HubFrom the above you can know that your network is a hub / switch by looking at column IP Source and Destination IP. If on any one line of both your ip then certainly your network is a network switch, if not ya mean the opposite.
How to Use Cain & Abel:
* Use of the program is much easier and simple than using wireshark, but if you want all packets that are already out and get your recommended using wireshark program
* Open the program you Cain
* Click on the Configure
* In the "Sniffer" select ethernet card you'll use* In the "HTTP Fields" you must add the fields username and password fields if you want its not in the list.As an example I'll let you know that if you want to hack Friendster password in the username you have to add fields and fields passworsd word name, for others you can find it by pressing right click view source and you should seek the input variables of the login and password the website. Already in default rasanyan quite complete, you can steal a pass at klubmentari without adding anything.
* After that apply and click ok settingannya
* On the main menu there are 8 tabs, and that will be discussed only one tab is the tab "Sniffer" because it is, select that tab and that tab do pindah2 of your own to prevent confusion
* Enable Sniffer sniffer by clicking the button at the top tab2 it, find the button that his "Start / Stop Sniffer"
* If you are on the network hub at this time you already know the password can be entered by clicking the tab (this time under the existing tab instead of in the middle, the middle is no need to click-click again) "Passwords"* You can just choose a password of the connection where you want to see will already listed there
* If you were there at the network switch, it requires more struggle, you must activate the APR is on the right tombolonya Sniffer (And this is not guaranteed to succeed because of the switches manage much more complete & secure from the hub)
* Before enabled the sniffer tab select the bottom of the APR
* It will be seen 2 pieces that are still empty list, click an empty list the top then click the "+" (shaped like it) in the range of the sniffer APR etc.
* There will be 2 pieces of field containing all hosts on your network
* Connect between the victim and the ip address ip address of the gateway server (to find out the address of the gateway server on the comp you click start select run type cmd then type ipconfig at the command prompt)
* After the new switch on the APR, and all the data from the comp victim to the server you can see in the same way.
You can run both programs on simultaneously (for APR Cain and wireshark for packet sniffing) if you want maximum results.
Passwords can be stolen is the password in the HTTP server (the server that is not encrypted), if such information is encrypted on the server that you have to decrypt the data before obtaining the password (and it will require langkah2 much longer than this hack )
For terms that do not understand can be found on wikipedia (english yes but if the indo jg not necessarily exist).
Technologically-both frequency bands 2.4 GHz and 5 GHz, which became operational container Wi-Fi technology is not free from limitations.
Because the users in a new area can take advantage of this system with an optimal wireless Internet, when all the devices used in the area using a uniform transmit power and limited.
If these preconditions are not heeded, will certainly take place harmful interference between devices is not just Internet users, but also with other telecommunication system devices.
If the interference continues, because users want more superior than other users, and therefore a lack of understanding of the limitations of the technology-in the end will make the path a frequency of 2.4 GHz and 5 GHz can not be used optimally.
Another limitation of this second line of wireless frequencies (particularly 2.4 GHz) is because it is also used for ISM (industrial, science and medical).
Consequently, the use of radio communications or other telecommunication device that works on the frequency band it should be ready to accept interference from ISM devices, as set forth in S5.150 of the Radio Regulations.
In ITU-R recommendation SM.1056, ISM device characteristics are also informed that essentially aims to prevent the onset of interference, both between the ISM and other woods with telecommunications equipment.
The same recommendation affirms that every member of the ITU-free set of administrative requirements and rules of law relating to mandatory power restrictions.
Recognizing the limitations and the impact that may arise from the use of both of the wireless frequency bands, different countries and impose regulations that limit the transmit power of the devices used.
Wireless Signal
Wireless LAN signals can be captured normally in the range of about 200 meters from the access point, but the client that uses an external antenna can pick up signals as far as 1000 meters. If you put AP near door or window, you can bet the neighbors can come to enjoy the Internet access or network traffic sniffing.
If the wireless LAN infrastructure that involves inter-building wireless connectivity is high, then the client is not desirable to do sniffing from the bottom as far as 2,500 feet (762 meters). So even though the ISP's wireless LAN signals to be placed in the tops of tall buildings can be in-sniffing from below (known as the war flying).
If you want to connect to the internet using wifi while you are away from the AP or wifi available where you can get closer to these areas and can play unlimited internet with the following steps
1) You must have a USB Wireless Adapter. You can get a computer shop in stores with prices ranging from Rp 210,000 (quite cheap for this sophisticated technology) + UHF antenna parabolic shape.
2) This step is a key step, namely by using UHV antenna shaped as a Grid Parabolic Reflector to amplify the signal.
3) To further strengthen the power of parabole Reflexy you can add wire netting on the entire surface, lalujangan forget screwing with the framework of the parabola. You can also add aluminum foil.
4) Install USB WiFi Adapter on existing poles in the middle of a parabola. If too long of focus can be cut.
Try to keep a USB WiFI is located at the focus of the parabola. Remember the focus of the parabola formula. When in doubt ya simple formula.
F = D (squared) / 4 (squares). C
D: diameter parabolic
C: depth parabola
5) plug the USB cable (USB 2.0 High Speed ​​cable system) in such a way.
6) Then reinstall the USB wifi support poles on the parabola. Plug in the iron pipe to facilitate antenne rotated around so nice.
7) If you've installed the USB drivers had WiFI (factory default).
Then install the "Network Stumbler" to find a strong signal and the closest.
8) Connect the antenna outside and insert the USB cable on your computer port. Scan pake Net Stumbler. Find a network that guns' in most deket ENCRYPT and the distance with you. Then join aja.
Access to wifi:
type:
secure, it means to be able to access we have to enter a password
unsecure, meaning we can access the wifi without having to fill in the password, jd direct connect.
An unsecure, sometimes also can not access the internet although it can connect to the network. This is because there are IP settings. For servers that use dynamic ip, then we do not have to bother with the ip, because ip sdh automatically inserted by the server to the client (our computer).
For servers that use a static ip, then we have to manually enter the ip for the computer / laptop we.
If we can connect to wifi tp can not access the internet, try our laptop ip change. Here's how:
right click the wifi icon in the bottom right of the screen
select properties
select Advanced
on the connection select Internet Protocol (TCP / IP)
select static ip
on the contents of ip: 192.168.0.212
content on the Net Mask: 255.255.255.0
on getway content: 192.168.0.1
on the content server dns: 192.168.0.1
click ok.

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | Affiliate Network Reviews
host gator coupon code