- Aug 27, 2010
- Reaction score
none of this is new. and it doesn't take an expertMITM hack attack is frequently used by expert hackers
since it helps them avoid having to break through encryption while intercepting Internet communications.
Using the technique, NSA operatives can log into a router used by an Internet service provider and divert target traffic to a copycat MITM site, where all the data entered is relayed to the NSA.
none of this is new. and it doesn't take an expert
it's very easy to spider (download the many layers of) a website _ mimic that site , and then redirect/record the input. It's a form of website spoofing. What's even easier is to plant a keylogger on someone's machine and record every single keystroke they enter
and as far as logging into routers __ that's also very simple. I could collect all sorts of information from anyone who uses a wireless router . . . by driving by with a laptop in my car
would you like to know if your SSID has been mapped ? check the following link out
WiGLE - Wireless Geographic Logging Engine - Browsable Web Map
so what . you've been located __ right ? but if you have never properly set security on your router , and I know that you're using a Belkin or Linksys , or whatever __ default passwords for those machines are listed all over the internet.
once I get inside your router ___ well. I really shouldn't say anymore
i didn't write the article.... and i am a network engineer, unix sys admin, and my last position was as an IT Security Analyst for Wells Fargo.... i hear you loud and clear.