Some Of The Vulnerabilities In Your Wi-Fi Networks
Security

Some Of The Vulnerabilities In Your Wi-Fi Networks

Internet is one of the most common things in our daily lives and one of the main methods of connecting to the Internet is through the Wi-Fi networks. But are our Wi-Fi networks really secure and protected to prevent the intrusion of third parties ? Maybe Not. So, to get a clear idea about the security levels of our Wi-Fi network, today we are going to show you some of the major vulnerabilities that can be in our Wi-Fi networks and also explain you about some of major types of attacks that can be made on our Wi-Fi networks.

Some Of The Vulnerabilities In Your Wi-Fi Networks


The Wi-Fi system is one of the most widely used method for connecting to the Internet, but this does not imply that it is the safest method. Currently Wi-Fi networks have big security problems and if we don’t take good measures to solve them, any user may get to compromise their privacy. The security of a wireless network is determined by several aspects, which can be configured from our router settings easily.


Encryption Methods Of A Wi-Fi :

One of the most important step for protecting our Wi-Fi network is to change the default password of our router. We can establish four types of encryptions: open , WEB encryption , WPA / WPA2 and WPA enterprise.

The open encryption and WEB encryption are the least safe encryptions. With open anyone can access our network and in WEB encryption it is relatively simple to get the key, so if we have any of these encryption methods our network will not be so secure .

The enterprise WPA encryption is more secure but less known method. This method consists of user authentication and saved passwords in a radius server . This method is very rarely used because it is the most difficult to set up, because we have to create the server and configure everything.

Most recommended is the WPA / WPA2 encryption, because it is only possible to obtain the key by performing a dictionary attack or brute force. This attack is carried out by generating a dictionary with multiple keys that try to match with the router password and gain access, the higher the dictionary, the higher the probability of access . Key WPA / WPA2 may also have other types of vulnerabilities.

Vulnerabilities WPA / WPA2 encryption :

Default key : The default keys are those keys that are set by the manufacturer by default in the router. These keys have security issues as there are dictionaries that include all these keys and using a brute force attack could come to get full access to the Wi-Fi network.

WPS : The WPS protocol is a failure associated with one of the methods of association, specifically the PIN with which you can access the access point. The PIN consists of eight digits, where the first 4 digits (no need to write the remaining four) key is incorrect, the router sends the message EAP-NACK , bringing the number of possible combinations is much reduced , so you can make a brute force attack with all possible combinations. The only solution for this is to disable WPS .

Other Vulnerabilities In Our Wi-Fi Networks :

Mac Spoofing : This occurs when someone obtains the MAC address of your network and poses as an authorized client. This attack can be given that the plates of networks in general for changing the MAC number by another.

Access Point Spoofing : In this case the attacker creates a fake access point and passed by him, the client thinks you are connecting to a real WLAN network when you are actually connecting directly to the attacker.

Man in the Middle ( middle-man ) : In this case the attacker is able to read, write and modify all the messages between two victims but none of them recognize it , thus acting as a connection between the two (Man in the Middle ).

Although there are a number of different vulnerabilities these are the most important. No network is completely safe, but if the necessary measures are taken then it will be much more difficult for the third parties to interfere, so we will gain in safety.

Leave a Reply

Your email address will not be published. Required fields are marked *