Skip to main content

Prove your security skills by hacking your own Wi-Fi network (or others)

how to hack wi fi hackeraccessgranted
igor.stevanovic/Shutterstock
There are any number of legitimate reasons you might want to hack into a wireless network. You might have forgotten the password to your own network and need to find your way back in. You might be testing the strength of your network’s security to make sure it’s hard for unsavory characters to break in. Whatever your reason, there are a few methods you can use to hack into Wi-Fi, and we’re going to show them to you. Just don’t do anything sketchy with your new-found hacking prowess.

Sneakernet

Sometimes the easiest way to break into a building is to just to walk in through the front door. These are known as “sneakernet” attacks, because instead of working across a network, you literally use your sneakers to walk somewhere.

Recommended Videos

If you really want to get on a network, and no one else is around to see you do it, you can simply plug your laptop into one of the Ethernet ports on the router. Not only will you immediately connect to the network without a password, but you can work your way into the router’s settings, since most people just use the router’s default admin username and password. From there you can change or view the password, manage connections, and even add your device’s MAC address to the whitelist so you can always join that network with no issues.KB19276-001_EN

A lot of modern routers are often equipped with a feature called Wi-Fi Protected Setup, or WPS. If it’s enabled, it will allow you to join a wireless network simply by attempting to join from your device, then pressing an access button on the router and holding it until your system is connected. From here on out, you won’t have to enter a password to get onto the network, the router will automatically recognize your computer or device.

Getting sneaky

In most cases, you’re not going to be able to sit down next to the router for a few minutes with a laptop, but there are other options. If you just need Internet access and don’t care what network you get it from, you can use a method called “wardriving” where you simply drive (or walk, or bike) around looking for unsecured wireless networks.

If that isn’t quite what you’re hoping for, the good news is that many people still use WEP as a network security method, and it’s notoriously easy to crack. The downside is that the tools used for such cracking can themselves cause trouble for your system, since you may have to download them from less than reputable sources.

One solution is a lightweight Linux distribution, PHLAK, designed for testing the durability of a network. It is easily run from a CD or USB drive. Staying away from your own hard drive allows you to use software without leaving any trace of it at all on your system, as well as protecting your personal information.

Phlak
Image used with permission by copyright holder

Once you have PHLAK burned and mounted to a USB drive, simply restart your computer to boot into the temporary operating system. Once inside, you’ll find a number of tools and scripts that will help you test the security of your network.

Bash the door down

If none of the sneakier methods of getting onto a wireless network seem to be doing the trick, you can always use what hackers call “brute force” to pull it off. It’s the computing equivalent to your friend asking you to guess what number they’re thinking of, and you guessing 1, and then 2, and then 3, and so on until you get it right.

There are a few drawbacks to this method of hacking into a network. The first is that it requires a lot of processing power, and a lot of time. Your computer will have to run through a dictionary of words and phrases, permuting them as it goes and trying every combination until one takes.

Strong password construction can easily get in the way of this process, or at least make it unfathomably time-consuming. While text-only passwords are common, and make it easier to get in because of the reduced number of possible characters, a full alphanumeric password with no discernible words and punctuation can make brute forcing near impossible.

It’s also important to note that this sort of attack is very vulnerable to detection. Most modern routers that receive too many wrong passwords from a single source will automatically deny any attempts after that for a long period of time. If it’s an office or professional network, chances are a network administrator will also be warned of the possible attack.

Brad Bourque
Former Digital Trends Contributor
Brad Bourque is a native Portlander, devout nerd, and craft beer enthusiast. He studied creative writing at Willamette…
What is Wi-Fi 7: Everything you need to know about 802.11be
Checking a Wi-Fi router and internet connection on a phone.

Wi-Fi 7 is the latest evolution in the 802.11 IEEE standard of wireless networking, and it's the direct sequel to Wi-Fi 6 and Wi-Fi 6E. It's faster, offers improved support for a greater number of simultaneous connections, and will be more adaptable, to better maintain low-latency connections. It will be an excellent solution for streaming ultra-high-definition video to multiple devices simultaneously, and may find use in future wireless virtual reality and augmented reality headsets.

There aren't many Wi-Fi 7 devices or routers available just yet, but a soft launch has already begun in China, and that rollout will gather sped in the coming years. To get you ready for the next generation of Wi-Fi technology, here's everything you need to know about Wi-Fi 7.

Read more
These are the airports that actually have really fast public Wi-Fi
MacBook Air sitting on a table in an airport.

With the holiday travel season quickly approaching, there is expected to be an increased number of travelers at airports across the U.S., and therefore significantly more people attempting to connect to free airport Wi-Fi at the same time.

Stable connections for free Wi-Fi hot spots can be a hassle in any location, but airport travel offers a unique situation, where internet speed options can vary depending on whether they are free or paid, or a perk of another subscription service.

Read more
This Wi-Fi security flaw could let drones track devices through walls
Professor Ali Abedi flying Wi-Peep standing against brick wall.

A research team from the University of Waterloo has attached a device to a drone that can use vulnerabilities in Wi-Fi networks to see through walls.

Imagine intruders being able to track people by the devices they have on them or find weak spots in their homes. This alarming possibility has been proven by a device called Wi-Peep, which is essentially $20 of easily-purchasable hardware, an off-the-shelf quadcopter, and the work of Dr. Ali Abedi and his team at the University of Waterloo.

Read more