How To Protect / Secure Your Wi-Fi Network?

Hello All, I am back to blogging again after 3-4 years motivated and ready than ever before. For 5 years now, I am working online on Upwork and some other freelancing sites as security expert helping clients fixing their hacked sites/servers so could not manage much time for writing but will try to regularly update with new hacking tutorials and tricks from now onwards. I have recently changed the look/design of site as well so I hope you would like it 🙂
Using man-in-the-middle attack, someone can eavesdrop on your network traffic and can easily get all administrator details and have un-authorized access to your Wi-Fi network.
So today I am going to provide some basic approaches to secure your home or office Wi-Fi network from hackers.

Logging to Router and Change Default Password

You have to look at back of your router and get login details like IP Address, Username and Password. Usually details are written at back and if not you may call your ISP (Internet Service Provider) if they gave you the router otherwise find the model number and look up information on Google.
D-Link Router Back
Visit IP Address in browser and enter login details when asked. This page is only accessible when you are using the router’s Wi-Fi network.
After logging in, first thing you have to do is to change default password setup by router. Settings may vary depending on which company router you using (mentioned image is for D-Link routers), some routers provide options to change default admin username as well.

Change D-Link Admin Password
Why should you change the default network password? With default password, someone can easily login to router setting (by default gateway IP which is not hard to find) and have un-authorized access to change router settings. So changing password would not allow anyone to access router settings except you.

SSID, Password and WPA2 Encryption

Pick a SSID (network name) which is not relevant to your identity or draw attention from hackers.
Use a strong password and once you do that please make sure to update passwords on all connected devices.

For encryption, make sure you choose WPA2 and not WEP/WPA. WPA2, short for Wi-Fi Protected Access 2, the follow on security method to WPA for wireless networks that provides stronger data protection and network access control. It provides enterprise and consumer Wi-Fi users with a high level of assurance that only authorized users can access their wireless networks

Firmware Update

Please consider updating firmware of your router which you can find under admin settings. Using the latest firmware version ensures you have all available security patches.

Disable WPS

WPS, short for Wi-Fi Protected setup is insecure so you should disable it. This is a button on your router.

Guest Networks

Some routers provide this option using which you can add guest network which creates a separate network for guests. It is a totally different network with a different password from the network. This means devices connected to the Guest network will NOT be able to share files and printers connected to the main network.

Guest Network

Parental Controls

With it, you can block inappropriate sites and limit the time your kids spend online.

Additional Settings

You may consider enable MAC Filtering (However they can easily spoofed and just give false sense of security) or Hide SSID.
There are wide ranges of settings under your router which you can change and set accordingly but please be cautious when doing so.
Any question? Please let me know in comment section.
Thank you.
Read More >>

MetaSploitable 2 Enumeration

Enumeration is the very first key step to hack/pen Test any vulnerable Target. In today’s blog, we are going to enumerate the Metasploitable 2 machine.For this, we are going to use some commands like Netdiscover, Nmap,rpcclient & enum4linux. In this part of the Metasploitable 2 enumeration tutorial, we will be enumerating the running services, accounts and perform … Continue reading MetaSploitable 2 Enumeration

Read More >>

7 Tips To Secure Sliding Glass Doors

Sliding glass doors are a great addition to your patio. With their unique construction, featuring large areas of glass and gliding tracks, homeowners can enjoy plenty of natural light and regulated ventilation. However, you will need to consult a security alarm company to keep your home safe. Burglars love sliding glass doors too. The large … Continue reading 7 Tips To Secure Sliding Glass Doors

The post 7 Tips To Secure Sliding Glass Doors appeared first on Calgary Alarm Inc..

Read More >>

Cracking Computer Password

PASSWORD CRACKING

Cracking Computer Password :

[The content is for  knowledge purpose. I am not responsible for any illegal work]

Hacking a computer is a useful and, at rare times, an important skill to pick up. Below are instructions for…

Read More >>

Pwning Windows 7 with Metasploit.

Hi..In this tutorial, I am going to show you; How to hack windows 7
with the vulnerability of Internet Explorer.

This Tutorial is for Educational Purpose only.
The exploit used is MS10_046.To use this website simply type “msfconsole” at yo…

Read More >>

How To Choose The Best Video Surveillance System

Quality, strategically positioned video surveillance cameras can help you catch intruders in the act, or deter them and keep the crime from ever happening. Installing a video surveillance system is a smart investment, whether it is intended to protect your own resources or to provide peace of mind to your customers . Below are some … Continue reading How To Choose The Best Video Surveillance System

The post How To Choose The Best Video Surveillance System appeared first on Calgary Alarm Inc..

Read More >>

SAMBAry save us!!

Remember linux users laughing at Windows users because of the now all too famous Wannacry? Karma. According to Samba, “All versions of Samba from 3.5.0 onwards are vulnerable to a remote code execution vulnerability, allowing a malicious client t…

Read More >>

Hacker General 2017-05-26 06:51:00

HACKING

Taking a start :

In computer security, a hacker is someone who focuses on security mechanisms of computer and network systems. There are a community and shared culture of expert programmers and networking wizards that trace its histor…

Read More >>

Secure VPN Services With Lifetime Subscription

PRIVACY – a bit of an Internet buzzword nowadays, because the business model of the Internet has now shifted towards data collection.

Today, most users surf the web unaware of the fact that websites and online services collect their personal informa…

Read More >>