70% of WiFi Networks Cracked by Researcher to Show Their Lack of Security

A researcher wanted to prove that a hacker could hijack a home network with ease by exploiting their lack of security, so he cracked 70% of a 5,000 WiFi network sample. This happened in Tel Aviv when he did the WiFi network cracking experiment, Tel Aviv being his hometown.

How Did the Researcher Do His Experiment?

The whole process unfolded as described below, according to the report this researcher published.

The researcher under discussion, by his name Ido Hoorvitch, took a walk in the center of the city and brought with him WiFi sniffing equipment. The intention was the collection of 5,000 network hashes that would help him carry out his research. The next step he followed was to exploit a vulnerability with the role to permit PMKID hash retrieval. This kind of hash is normally useful for roaming purposes.

How PMKID hashes can be gathered? Well, he made use of two things: a network card to the tune of $50 and the tool that allows packet injection. Then, next, he used the free software WireShark for sniffing purposes. In that PMKID hash, one can find 4 things: the passphrase, the MAC address, the SSID of the network, and last,

Read More: https://heimdalsecurity.com/blog/70-of-wifi-networks-cracked-by-researcher-in-a-wifi-network-cracking-experiment/