InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Follow publication

This Is How I Hacked My Neighbors Computer

Not only websites and companies get hacked, A real-life story

c0d3x27
InfoSec Write-ups
Published in
4 min readJun 26, 2021

--

Disclaimer: This is a person I’m friends with now and surely this is not a tutorial, which is why passages are missing!

Intro

For some weird reason, I thought my neighbor was a secret service agent, CIA, or something similar. The way he move, talk and behave just gave me that feeling. One night after seeing him go to his garage and staying there for hours, I knew something strange was going on. I need evidence to back up my claims, and the only thing that came to my mind was to get into his home network.

Set-up

I fired up my computer, pulled out my OS CD collection and installed Kali Linux. Everything was ready, up, and running to start my adventure. Suddenly I noticed that my internet company had a blackout. Now What? Well, I needed an internet connection to Google stuff and analyze any given information.

Accessing a wireless network

Since I didn’t have internet and my main goal was to dox him, my first step was try to hack into his home Wi-fi. As soon I started gathering information, I noticed his router was using WEP protection, What?!

WEP

WEP (Wired Equivalent Privacy) is a security algorithm for IEEE 802. It was developed with the intention to overcome the data confidentiality issues with the traditional wired connection. It gave better data protection by encrypting the data transmitted to avoid eavesdropping.

WEP authentication works using two methods:

  • Open System Authentication (OSA) — OSA helps you gain access to any WEP network as well as receive files that aren’t encrypted
  • Shared Key Authentication (SKA) — SKA allows a computer equipped with a wireless modem to gain full access to any WEP network and exchange both encrypted and unencrypted data.

--

--

Published in InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Written by c0d3x27

OSCP || OSWE || CompTIA CYSA+, Sec+, A+, ITF+, CSAP | | 0-day Researcher | | Security Consultant

Responses (10)

Write a response