Can I use a cat to hack my Wi-Fi environment?


ByGreyloch

"Tada ride" act that you can access unauthorized to other people's Wi-Fi environment can unlock passcode in a momentprogramYahardwareHas become a familiar security hazard by the appearance of. The latest epidemic of such Wi - Fi free ride seems to be a hacking method which made "cat" spy.

How to Use Your Cat to Hack Your Neighbor's Wi-Fi | Threat Level | WIRED
http://www.wired.com/2014/08/how-to-use-your-cat-to-hack-your-neighbors-wi-fi/

The "War Dialling" method of repeating dialing exhaustively to search for closed lines has been in the 1980s, but the hacking method of exhaustively searching for unprotected Wi-Fi circuits is a modern version of War Dialling and But that Google should also use Street View CarPayload dataIt became clear that they were collecting,Big problembecame.

In order to prevent hacking by malicious intellectual property, it is essential to apply sufficient strength encryption when using Wi-Fi, but in the USA it is an experiment to collect Wi-Fi information using cats in the USA As a result, it is reported that you gave a surprising "result".

Security expert Jean Blancisfield programed a simple decryption tool on the cat's collar of the catSpark CoreWe installed a chip, a GPS module, a battery, and conducted an experiment to investigate the surrounding Wi-Fi environment. The cost of manufacturing this equipment is less than 100 dollars (about 10,000 yen).


With a three hour walk, Coco succeeded in gathering data mapping the neighboring Wi-Fi network environment, of which four old and easily encrypted Wi-Fi environments that can be broken through security , He seems to have discovered a Wi-Fi environment of no-guard which does not have four encryption countermeasures at all.

Mr. Brancisfield will hold this achievement this weekendDefCon hacker conferenceIt is planned to announce in the title "How to make your pet a hacking weapon." "My intention is not to provide a way to ride free on Wi-Fi, and the lesson learned from this experiment is that the security such as WEP still uses monkey's encryption technology as of 2014 Hot Spot was around there, "said Brancisfield.

in Note,   Software,   Creature, Posted by darkhorse_log