How To Protect Or Hide Yor IP Frpm Hackers
Live/Persistent: a mode that an operating system can be in where it can be booted from a non-permanent device on a machine such as a CD or in the case of persistent mode where it is booted from a USB drive and can be edited.Aircrack-ng: software executed in a terminal on Linux to allow users to hack into surrounding wireless networks.Skid: a person that uses technology pretending they know how to use it but don’t really know how, basically a slightly more professional way to say a noob.Type 3 packet sniffing: black hat/wireless cracking, is the most commonly abused category of all packet sniffing types because it’s the easiest to do, and is the most useful I think. I recommend you read the previous posts on packet sniffing before continuing.Usually packet sniffing is performed by a Skid using an operating system called backtrack in either live or persistent mode. They would start up Terminal and type in a series of commands out of the Aircrack-ng library. Most likely the Skid would search on YouTube “how to crack wireless” or something along those lines. Once the Skid has found the video the Skid would then watch/follow the video to hack the wireless network without knowing what he actually doing .- How can I Protect my Wireless?
When it comes to protecting yourself from these types of attacks there is actually no way to be 100% safe but you can get 99% of the way there. By upgrading your wireless router/modem to a device that supports WPA2 and using randomly generated non-dictionary 26 character long password including capitals lowercase numbers and symbols it will make it almost impossible to hack by brute force and the new WPA2 technology is way more resistant to algorithmic methods of decryption. You may be told that setting your router in different modes can protect you but there’s always a way around the mode you set. For example turning off Promiscuous Mode (doesn’t allow external packets) but by simply just using the Mac address spoofer the hacker can get right past that. So basically there’s no real way to protect yourself from these types attacks with any certainty .- Can I Detect if Someone’s Using my Internet?
Most of the time you can detect if someone is using your Internet by using wire shark software and by packet sniffing your own network as I explained in my earlier posts. If the hacker knows what he’s doing he would be VPN tunneling through your network. The reason why you can’t detect the VPN tunneling is because he could make it look like it’s your antivirus updating or your Windows update or something but a conflict arises because of not updating your network. Most of the time these exploits include Java, software that updates and other things that don’t even make sense but you don’t question if you don’t have enough knowledge. So I guess if you know what you’re doing and protecting your network, you should be able to detect when someone is VPN tunneling you. There will be of no for sure way to tell but their activity might look a little suspicious. For example if your antivirus was updating 24/7 that would be a flag. Back in the old days, 2005 or earlier, it would be possible to boot up a live OS like backtrack or some other Linux and then wire shark your network and turn off all the devices in your house and only the hackers activity would show up but nowadays even your router is contacting places for updates which would show up in your wire shark so the hacker could hide in that stream. For example if you have a Bell router it is constantly streaming information to Bell even if you are not doing anything.