Monday, May 16, 2011

Breaking into the Hotspot network access mode


For this paper to study computer science rather than willing to give advice well, but only as a lesson wrote the way to break into the network hotspots and wireles internet cafe can you catch being OK.This trick can also be use to find a password that is used by someone in the venom hotspot access using prepaid cards or a member of a cafe Lho! note well yes!

Simple tool that prepared hell wrote:
- A set Laptop: Pc who got wireless is fine, as long as hotspotnya nyampek network.- Laptop Charger: for surely takes a lot of battery power when the Internet craze.
Software required:
1. AngryIP Scanner (108 kb): This software for scanning mac address ip and find victims. Software search in google aja kok small size. Stay put aliases do not need installation.
2. Mac Address Chager (312 kb): this software to change the mac address dipergunkan us. Mac Address? Explain the importance not need to be makeknya, ngeti uncertain as we go along. (From the street not far "^_^"). Please search on google.
Jump now to the way he wrote:
1. Find the location of the hotspot service provider, certainly in areas that are affordable hotspot network.
2. Turn on your laptop, and also turn on your wireless network and see the wireless network system tray icon, then right click and select view avalible wireless network, and of course after that you must connect to a wireless hotspot is your destination.
3. After the connect, right click the system tray and select status> choose details tab> look there ip given to us. Write down the ip is.
4. Open Courses AngryIP Scanner and enter the ip range that we will scan (using the data we had ip) at the top. For example: the IP that we can xxx.xxx.x.xx kemuadian enter the ip in the first column of our range in accordance with the ip that earlier but replace the number at the end with 1 to xxx.xxx.x.1 and in the second column write the same but the figures one end was replace with 255 to xxx.xxx.x.255. results xxx.xxx.x.1 to xxx.xxx.x.255 and click start (red button).
5. After the scan then we will get a live ip data connected with these hotspots. after scanning is complete then see the ip of the living (alive hosts) blue right click on the live ip ip Right-click on the blue color was right click> show> mac address and there will be code mac address (sometimes there are mac addresses are not displayed, select Just another ip). Write down the mac address that we get.
6. Open the Mac Address Changer program we have prepared. There is a mac address field. nah now lives change mac address with which we got earlier and press change mac id.
7. Wait for our mac aan replaced and temporary connection and connect again automatically disconnected itself.
8. Log in firefox web browser or whatever may. Enjoy Free Internet ...
One thing to remember is that we ride the system of data transfer on our account was hacked (which have the ip before, sorry ...). If I still usually to outsmart is to enter the hotspot login status page (in order to accounts). eg idonbiu.hotspot.net / status and so go there it looks prepaid card code number and we note only, then logout and log back in to the hotspot login page that quickly enter the password earlier. This will make us directly to access the Internet without a ride again (because that make it our prepaid card code) so if anyone wants to login to use the card (which has a code) when you log in using the card of course he would not be able to enter because cardnya prepaid cards "already logged".
How is, interesting is not it?
But I suggest, as I do is to ride alone, because I do not want to go too far, like the way that I beritau to log off and log in again certainly will make the owner can not log in.. Kasian right?
So while already dikasi free, why not ride it, yes, it was counted cuman follow-up with my ngakses'm not too harmful. Request permission to direct also the possibility that had not refused, so long as interests are indeed urgent.
For Ip Sacanning I can also use the application dude to know the condition of the computers connection to the hotspot. Can be tried is also yes.
Once again, all this just for the learning course, as long as we are still capable of why not use the legal aja. And this can also be used by the hotspot owner, if this method can still be used to break into. So needless security lebihTongueTop ...


source: www.imam77.co.cc

0 comments:

Post a Comment