Piggybacking is a term which states that something that is riding on the back of something else to complete his/her motive, just like similar to an idiom putting gun to another’s shoulder and performing the Hunting, so piggybacking is a term used to refer to access of a wireless internet connection by bringing one’s own computer within the range of another’s wireless connection, and using that service without the subscriber’s explicit permission or knowledge. It is a legally and ethically controversial practice, with laws that vary in jurisdictions around the world. Piggybacking is an unauthorized tapping into another’s connection with a public utility.
For e.g.- So piggybacking can be takes place like when I am accessing the wireless connection of my neighbor Wi-Fi without his/her knowledge by hacking his static ip address, then it would be possible for me to access the Wi-Fi connection of others.
What is Wi-Fi Technology?
A way to get Internet access, the term Wi Fi is a play upon the decades-old term HiFi that describes the type of output generated by quality musical hardware, Wi Fi stands for Wireless Fidelity and is used to define any of the wireless technology in the IEEE 802.11 specification - including (but not necessarily limited to) the wireless protocols 802.11a, 802.11b, and 802.11g. The Wi-Fi Alliance is the body responsible for promoting the term and its association with various wireless technology standards.
What are your preferred tools for WarDriving?
Preferred tools for WarDriving are as follows:-
a) Kismet- Kismet is a 802.11b wireless network sniffer. It is capable of sniffing using almost any wireless card supported in Linux.
b) Airsnort- is one of the first tools to come out discovering insecurity of wireless network. AirSnort is a wireless LAN (WLAN) tool which cracks encryption keys on 802.11b WEP networks. AirSnort operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered.
c) WEPCrack is Perl based tool. WEPCrack is a tool that cracks 802.11 WEP encryption keys using the latest discovered weakness of RC4 key scheduling.
d) WaveStumbler is console based 802.11 network mapper for Linux. It reports the basic AP stuff like channel, WEP, ESSID, MAC etc.
e) Aircrack yet another WEP cracking tool for Linux courtesy by divine.
What assets are available for wireless?
Brand assets are available here for wireless, brand assets can also be applied to m-branding. In particular, three of the assets can be targeted directly for improvement with the m-branding methods that are available today. These are brand awareness, brand associations and brand loyalty.
How to crack Wi-Fi network, if you are using WEP (Wired Equivalent Privacy) Password with backtrack?
The first line of defense of your Wi-Fi network is encryption, which encodes the data transmitted between your PC and your wireless router.
WEP abbreviates for (Wireless Encryption Protocol) it is a less-secure protocol than WPA (Wireless Protected Access). Since WEP is relatively easy to crack, so you have to use the same form on all devices on your network. If you have an older router that supports WEP only you’ll be best safest if you use 128-bit bit WEP keys but also check the manufacturer’s Web site for a firmware update that will add WPA support.
Two of the most popular programs used for actually cracking the WEP key are Airsnort and Aircrack. Airsnort can be used with the .dump files that Kismet provides; and Aircrack can be use with .cap files that Airodump provides.