Skip to content

Wireless Hacking (Part 1)

security hack

Words of Advice Before You Use a Wireless Network Again

Part one of a three-part story.

A recent firsthand investigative report showed just how easy it is for a hacker to go to a coffee shop or airport, tap into the wireless network (like everyone else), and begin collecting information off the laptops and smartphones of people around him. This happened in real time, in broad daylight. And it can happen to you at any time you’re connected to a wireless network and a local hacker decides to sit down nearby and monitor the Internet activity.In this case, the hacker (“Mr. H.”) agreed to demonstrate to a reporter how easy it is to eavesdrop on the Internet activity of innocent, unsuspecting victims. Fortunately, the hacker agreed not to do any kind of damage—he was simply showing off his skills and helping to educate readers (eventually) on the ease of hacking a wireless network.

Here’s what they witnessed.

A hacker in action.

On a sunny Saturday, the reporter and Mr. H. drop into a cafe that is crowded and has a wireless network. Of course, just about everyone under 35 is online with their laptop or smartphone…checking websites, sending emails and updating their social media pages.

Mr. H. is soon online too, and in less than half an hour, he has a profile on most of the people in the cafe. He claims to know where they were born, where they went to school, and even the subjects of the last half-dozen Google searches they did.

How does he do it? Ah, that’s the hacker’s secret, and Mr. H. let the reporter peek into his bag of tricks. In his backpack, Mr. H. has a small black Internet device, about the size of a deck of cards…and it has an antenna.

Mr. H. gets to work, starting off by simply blending in. He brings out his laptop and the black device, turning both on, but conceals the black device under a napkin. While he’s ordering a cappuccino, he asks the waiter for the password to the wireless network.

While people around him are opening word processing programs and Web browsers, Mr. H. launches his own special programs, and in a few short minutes, he has some very interesting information popping up onscreen. Using his devices and special programs, Mr. H. has already managed to view the messages coming from the laptops, smartphones and tablets of the people around him…who are all on the same wireless network.

On Mr. H.’s computer screen, names such as “iPhone SteveL” and “ChrisMacBook” begin to appear. That’s because he has intercepted the signals that are being sent directly from Steve L.’s actual laptop, Chris’s actual MacBook and all the other devices around the room.

Mr. H. is just getting started. Not only can he see the names of the connected devices—he can also see online conversations and activity in real time, as well as the names of the Wi-Fi networks people had been connected to earlier in the day. With a little imagination, he can almost connect the dots and figure out what the people have done that day.

For instance, according to one cafe patron’s network history, he’d been online at a fast-food chain not too far away. He had also been at an international airport, logged in to a network of a major airline carrier, which means he was likely an out-of-towner. Finally, his network history revealed connections at a local hotel and a local tavern.

You can see how a hacker can put together a profile of someone—maybe you—in just a matter of minutes, with nothing more than prying Internet eyes, the right technology and a little know-how.

And how is our hacker doing? It’s about to get interesting…because the waiter brings Mr. H. the password for the wireless network. And once he has that, he’s going to take his hacking to the next level.

You can read about it in the next installment

Related Articles

Related Articles

All
  • All
  • Easy Prey Podcast
  • General Topics
  • Home Computing
  • IP Addresses
  • Networking
  • Online Privacy
  • Online Safety
Image of a man standing next to a huge brain

Here’s How to Choose a VPN: Don’t Overthink It and It’ll Be Fine

We're not all IT (internet technology) types, but don't tell that to VPN review sites! They make...

[Read More]

Email Scams 101: How To De-Code Sketchy Emails

Why are they dangerous? Because most, if not all, of our accounts, are tied to our email….

[Read More]
Scammers are Everywhere! Who You Gonna Call?

SCAM PREVENTION: Call a Good Friend BEFORE You Get Scammed!

Make someone in the family the point-person to stop a scam in progress. Scam prevention tactics are…

[Read More]
SCAM

How a Scam Works: It’s All in the Formula and You’re an Ingredient.

A scam works (for the con artist) when all the elements come together just right.

[Read More]
Scam Savy

Avoid a Scam and Stay Safe With these 8 Simple Tricks

Scammers have a bag of tricks to try to separate you from your money. However, you can...

[Read More]
Cyber Crime

The Top Scams Aren’t Going Away Anytime Soon

Some aren't only victims of scams, there also victims of circumstance. They may lose their job and...

[Read More]