Skip to content
  • Home
  • Search
  • Tools
  • About
  • Terms of Service Agreement
  • Log In
  • Guest

SECURITY: DO YOU USE WI-FI? STICK WITH THIS TIP TO AVOIT INTRUSION ATTACK

Posted on February 23, 2020August 30, 2020 By Andre Dias
network, security

I describe a scenario when this kind of attack happens, supplying a few technical details and a solution that will help you to be protected avoiding that an attack like this comes to be successful.

Attacks always happen. This is a rule of thumb.
The golden key is to avoid them or make them ineffective, and if possible, given some extra duty for those who live by stealing your privacy.

This article was written to attend most people, no matter the technical knowledge they may have and for this reason, contains extra details.
After all, security is for all.

SCENARIO – ATTACK PRE-CONDITIONS

You are working on your notebook connected to the modem using an RJ-45 cable to access the Internet plugged straight to the router.

See figure.

 

 

 

 

The cable connecting to the  notebook (or desktop)

Notice that you may have another cable connecting to a local network, or not, or whatever. It doesn’t matter.
The key to our scenario is that the Internet connection is via cable and not Wi-Fi.

If you have this, you get on the Windows taskbar the icon shown by the red arrow:

If your connection is using the Wi-Fi, the icon is different, something like this:

When you click on the network icon (red arrow), you get the following:

Notice that Wi-Fi is turned off, instead, the cable connection is on.

THE ATTACK

The Internet connection starts to fail and stops.
Without connection, if you are desperate, you try to connect via Wi-Fi.
This is exactly the point when the attack begins.

The Wi-Fi connection protocol sends your password at the handshake when it becomes vulnerable to be sniffed by the attacker.
It is exactly what the intruder wants you to do – switching from cable to Wi-Fi it is possible to get your password and from that point on your privacy has gone.

This YouTube video shows how a password is obtained during the handshake.

Hacking Into WPA and WPA2 Wireless Networks

There is also a good summary of complementary information here: “How to Hack WiFi (Wireless) Network“.

The key to this attack is to force you to go on Wi-Fi but this is only possible if the intruder has the means to provide this situation that depends on the flaws of the router model.
Older routers are more vulnerable, like for instance D-Link DWR-922, although excellent device, but the years have come to it…

During this attack, the cable connection is constantly put down.
After the attack is over, the device will get back to work as usual.

The intruder must be near you, or at least the devices that is handled during the attack remotely.

There are tools that warn you when suspect action is being taken on your connection and also identify from where it comes.

Lenovo offers this feature embedded on its recent machines. The figure below shows the “Threat locator” in action.

HOW TO PROTECT YOURSELF

 

1. Golden rule:
Avoid Wi-Fi connection for sensitive information.
Better using cable connection to the router that avoids handshake and makes it possible to detect when the thing goes wrong.

Use Wi-Fi for non-sensitive information, like watching movies, etc.

2. Use a smartphone for financial procedures (bank operations), but be aware of the next advice.

3. Make sure that your smartphone is secure.
Smartphones are strict personal devices.
Never, ever, borrow it to someone.

3b. Install good security applications.
It is required a good antivirus, firewall e a VPN service.

What is a VPN?
VPN avoids network exposure.

4. Use strong passwords.
In this kind of attack, the password strength doesn’t help.
So, strong passwords are useless?
The answer is NO.
They are required to protect you against other kinds of attacks.

HOW TO HANDLE THIS ATTACK

Just turn off the router.
If you have a second, switch to the other, otherwise, you may use your smartphone to provide a temporary connection through the “Tethering” feature until you provide a new router.

When the attack is gone, the device returns to work on cable, but the intruder may return a new attack bothering you.

 

 

Andre Dias
Andre Dias

Brazilian system analyst graduated by UNESA (University Estácio de Sá – Rio de Janeiro). Geek by heart.

Post navigation

❮ Previous Post: CHROME’S MESSAGE: “MANAGED BY YOUR ORGANIZATION” ISSUE
Next Post: VPN: SOLVED EXPRESSVPN APPS’ DOWNLOAD/UPDATE BLOCKING ON ANDROID PLATFORMS ❯

Search

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Filter by Categories
angular
bootstrap
browser
computer science
container
data persistence
database
devops
editors
hardware
health
hosting
info
internet
it
java
javascript
network
node.js
play
protocol
security
self-help
selfhelp
server
services
soft
software engeneering
sql
support
Systems
techs
Uncategorized
versioning
web
web design
windows
wordpress

Recent Posts

  • Angular From Scratch Tutorial – Step 9: Modal
  • Angular From Scratch Tutorial – Step 8: Miscellany
  • Angular From Scratch Tutorial – Index
  • angular: Reading JSON files
  • NODE.JS: SEQUELIZE: MVC Project – 4TH STEP

Categories

  • angular (19)
  • bootstrap (6)
  • browser (4)
  • computer science (4)
  • container (1)
  • data persistence (2)
  • database (11)
  • devops (1)
  • editors (1)
  • hardware (4)
  • health (2)
  • hosting (1)
  • info (1)
  • internet (2)
  • it (1)
  • java (13)
  • javascript (32)
  • network (6)
  • node.js (1)
  • play (1)
  • protocol (1)
  • security (4)
  • self-help (1)
  • selfhelp (1)
  • server (2)
  • services (1)
  • soft (1)
  • software engeneering (1)
  • sql (1)
  • support (2)
  • Systems (1)
  • techs (3)
  • Uncategorized (2)
  • versioning (6)
  • web (1)
  • web design (5)
  • windows (3)
  • wordpress (4)

Copyright © 2025 .

Theme: Oceanly by ScriptsTown

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT