Execution

The execution stage is the part of the hacking process in which the target system is finally hammered. This stage is often quick and over before anyone can detect the intrusion or trace the hack attempt back to the originator. A hacker will want to be sure he knows how to get in and get out without alerting any IDS or watchful system administrators.

As we discovered, the vendor of our detected access point is Linksys. We also discovered that the access point’s IP address is 192.168.1.1. This is the default IP address, and as such intimates that the other settings might be at their default setting as well. By researching the Linksys unit, we know that configuration changes are done through the use of a Web interface. Thus, we open our ...

Get Maximum Wireless Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.