4n6strider

Your Data Zen starts here.

WiFi Security – Encryption methods distribution

We all love WiFi. It used to be breaking new technology, but now it is considered as a standard. Regardless whether you are at work, at school, at home or just having fun out in the City.

Internet providers usually lack of interest for wireless home security and people tend not to care at all until something does not work.

This situation is definitely awesome, if you are a hacker seeking some disguise. Home – grade wireless routers usually lack logging or monitoring capacity in general.
This means, no traces are left in case of the security breach. Regular user won’ t even notice becoming internet provider to someone else.

With new legislation in cyber-security, everybody is actually fully responsible for his/her own devices. It means that lawsuit might be started against person, whose device was abused for malicious purposes by someone else.

Just for fun, right.. I have analysed WiFi networks in places I am present on daily basis. I am located in Prague, occasionally going for some hiking trips in Czech countryside.

I have gathered more than 30 thousand different networks names in less than a month.

 

Below picture shows distribution of encryption methods at home networks.

First without labels:

fa2-5

Labels for better understanding:
fa2-4-labels

{Blue} OPEN: Fully accessible network. Basically owner is sharing the traffic with all the secrets with anyone, who is listening.

{Green} WPA2: Strong encryption method. Owners are considered to be protected.

{Violet} WpaPSK: Also, strong method providing security to network owners.

{Orange} WEP: This method is no longer considered as secure. During my research activity I have set up WEP WiFi network and managed to get in couple minutes. Event high password difficulty was not an obstacle at all.

Note: Many people uses this method because they have either default settings on router purchased long time ago, or they fail to use any other method due to obsolete hardware / software.

{Blue2} HIDDEN: There is small area under the WEP section, also blue. This is for hidden WiFi networks. Some people think, if they hide the network that they are safe.

Well, not really. Actually it always attracts my attention because it means some obsolete hardware is somewhere close set up by not educated user.
It is either juicy network, or honeypot.  So either something weakly protected or something interesting is around worth of the attention.

 

Different visualization method for comparison:

(Labels are same as in introductory picture)

yfh-fa2-2

 

 

Next Post

Previous Post

© 2017 4n6strider

Theme by Anders Norén