Skip to main content

Kismet

As you setup your wireless access point you need to make sure it has encryption either it's WEP or WPA. My recommendation is WPA2 if you have that choice.
More likely wireless network don't have a password on it - over 80% of them don’t.

  1. Using kismet the hacker watchs you check your email. Kismet records every packet you send on the network.
  2. Kismet records the email server you connected to, and the login name and password you used to get your email.
  3. The hacker lets Kismet collect wifi packets for several hours, usually during the peak times this wifi network is in use. If this is a nearby hotel the hacker collects packets through the evening, if it’s a cafe or sandwich shop the hacker collects packets during lunch.
  4. The hacker goes back home and runs dsniff on the capture files that kismet created. Dsniff dumps out all the servers and name/password combinations that kismet collected that day.
  5. The hacker gets your server and login name/password and sets up his email client to now download all your email into a special folder. You are completely unaware he’s doing any of this.
  6. The hacker monitors your email for several weeks, taking note of all the emails you get from online stores. The hacker compiles a list of all the stores that send you emails.
  7. After several weeks of silently collecting your emails and making a list of where you have shopped the hacker is now ready to strike.
  8. The hacker goes to each of your stores and has your password reset. To do this all he has to do is enter your email address and click “forgot password”. The online stores quickly oblige him by sending a new password to your email, which the hacker is receiving. The hacker takes not of each of the new passwords and quickly deletes those emails from you email server so you never see them.
  9. The hacker then returns to each of the stores with the new passwords and places orders.
  10. The hacker has the items sent to a different address, usually an apartment complex where UPS/FedEx just knock on the door and drop the package off.
  11. One thing about online stores these days. They don’t charge your card until the merchandise is ready to ship. The hacker will have the packages overnighted which means your card is charged and he receives the goods the very next day.
  12. Most people will never be aware they’ve even been charged until it’s too late the hacker has long picked up the packages and can’t be caught.
Take note, all it took was the hacker gaining access to one thing. That’s how hackers work, they only need access to one thing, and from that they figure out how to gain access to other things. Another thing to note. The hacker never had to know your credit card numbers.

There are more complicated examples than this one, but this is certainly one of the easiest to understand.

Remember, everything you do on a wireless network can be seen by anyone else in the area, all it takes is one person deciding to record your activity and you can fall victim to identity theft very easily. So remember make sure there a lock when paying or ordering when on-line and remember if no one is on a wireless connection which means none of your clients, employees, or home users have a wireless card then, turn it off. 

Comments

Popular posts from this blog

Setting up your Linux Firewall Distribution (Part 1)

Today I'm going to show you how to get start. In order to create a network you must design it in paper, visio, or any kind of drawing that shows your plan. If you don't create some kind of drawing your network will not be very efficient. This drawing was done Microsoft new version of visio which is still in beta it called visio 2010 and yes I do have a legit license for it. The way that I design this is setup as two networks instead of one. Reason why you may ask because Network A is does not have a speed restriction and not monitor. Network B is has a speed limit and it is monitor. This is a basic drawing for this configuration. Remember the computer that your going to use must have at least two network cards. Let's break it down the red line named eth0 is your unfilter internet access which your trying to protect. eth1 is the green line which is your internal network which means that anything inside that network is protected. The blue line is optional, but I use it f...

New PDF Tutorials

I made some new tutorial enjoy! The Linux Permission PDF is how you can control your user see what files or folders. File Name: Linux Permissions.pdf File Size: 847KB Date Created: 03/25/2010 Download Now The Recover Your Data PDF is how you can recover your files in cases your windows operating system isn't booting up or your windows OS has spyware or virus.. This is the first half of recoverying your data. The second part will show you how to recover a deleted file, but that would be explain in the next PDF File Name: Recover Your Data.pdf File Size: 1540KB Date Created: 03/25/2010 Download Now   Hosted by Microsoft Office Live

Learning Linux

Learning linux from the ground up is really a challenge. As you progress even more you start customizing your OS from how it starts and how it shutdown. As soon as you start on a Live CD your x server is pretty much either gnome or KDE. I mean it looks easy to do, but as soon as you start research how the x server it can get trick. My recommendation is to also learn the bash line or command prompt. if your good with the line commands then reconfiguring your computer shouldn't be a problem, but you just learn the GUI layer of it and not the line commands believe me your going to have hard time restoring your computer. As I ask people around they say linux is hard to install. The easiest way to partition your drive manually is like this. sda1 /home -- This is where you want to store all your data in case your linux gets corrupted. This space can be as big as you want sda2 /swap -- Linux is just like windows it needs it virtual space. The swap size depends on your phys...