Bait Open Wifi to hack into Mobile

RoadToOSCP
2 min readJan 16, 2023

--

Do you love open Wi-Fi? Wait before latching onto open Wi-Fi read this, I am your opinion would change.

Hackers many a times leave the their Wi-Fi open to use it as a bait. When someone connects their device to their open Wi-Fi, our device’s MAC address and IP address are registered in their Wi-Fi router. Then Hacker can run the innocents behaving attacks to intercepted our data over the network.

Sounds Exciting Right?? But how to do it?

So before getting into the details of that lets try to understand some basics of Wi-Fi technology.

As per Wikipedia Wi-Fi stands for Wireless Fidelity, and it is developed by an organization called IEEE (Institute of Electrical and Electronics Engineers) they set standards for the Wi-Fi system.so in short it works on 802.11 family of protocol(which has witness multiple changes).

Now lets talk some more technical about its working!!!

WiFi Connections

Wifi client send a probe request to find the matching access point. Once matching done it will send an authentication request probe(This is where vulnerability lies?? How??). followed by association probe and response. The diagram below is illustration of the process.

Now practically when we use Wifi router at our home we set an password what this password is for, this is for saving our network from easy encroachment from others.

Technical again:

Most wireless APs come with the ability to enable one of four wireless encryption standards:

  1. Wired Equivalent Privacy (WEP)(obsolete)
  2. Wi-Fi Protected Access (WPA)
  3. WPA2(maximum prevalent)
  4. WPA3

The above built-in encryption helps to hash our password and send it over wire during the authentication probe sent by our Wi-Fi clients to our APs.

What danger it can pose.

So lets watch our live demo where we have explained the method of breaking into the key over the wire and once attacker have our key then he can easily monitor our devices.

--

--

RoadToOSCP
RoadToOSCP

Written by RoadToOSCP

Security enthusiasts and avid python fan

Responses (1)