Why is my wifi hacked?
1. The wireless key is leaked
Under the hype of “free Wi-Fi Internet access”, more and more people can’t stand the temptation of “free lunch” and join the ranks of “crashing the Internet”. At the same time, many people also found that their wireless network was “cracked”, suspecting that the wireless router was cracked by software such as the WiFi master key. As everyone knows, “external disasters arise from internal causes”. The process in which the wireless key is leaked will be illustrated in detail below.
Interpretation of the process: After a mobile phone installed with the network software is connected to its own wireless network, the network software will automatically or manually upload the name and password of the wireless network to its server. When other people search for this wireless signal using a mobile phone installed with the network rubbing software, they can obtain the password of the wireless network, thereby achieving the purpose of rubbing the network.
In other words, when you enjoy a “free lunch” using rubbing software, your “lunch” is likely to be shared by others.
2. The wireless network is not encrypted
We compare the wireless network to a home, then the name of the wireless network is a door, and the password of the wireless network is a lock of the door. If there is no lock, as long as other people find the door, they can enter and leave the house at will, and even take away the things in the house. An unencrypted wireless network is also called an open wireless network. Wireless devices that detect the signal can see that the network is not encrypted and will try to “crack the network”.
3. The wireless network is cracked
Brute-forcing methods are generally used to crack wireless networks. In theory, as long as there is enough time, there is no password that cannot be cracked.
The wireless password encrypted by WEP is equivalent to a lock with an A-level lock cylinder (general routers have removed this encryption method), and the anti-theft coefficient is low, which can only withstand a few minutes; while WPA/WPA2 is a super-B-level lock. Core, the anti-theft coefficient is high, if the password setting is more complicated, it will not be cracked under normal circumstances.
What harm will be caused by being rubbed on the Internet?
1. Affect network stability
The total bandwidth of the home network is like a piece of cake. If other people share the cake, the rest may not be enough. If the Internet hackers use the network to perform large-traffic operations such as P2P downloads or watching online videos, it will inevitably occupy a large amount of bandwidth, resulting in network lag, slowness, or even disconnection, making people crazy.
2. Threats to network security
If the key to the anti-theft door of your own home is carried in someone else’s pocket, the things at home may be taken away quietly. When the Internet hackers connect to your wireless network, they are in the same local area network as you and can access each other. He can enter the router management interface to tamper with the configuration information of the router, and can also access any computer in the same LAN to steal files and even network account information in the computer, bringing serious consequences.
How can I tell if my Wi-Fi is hacked?
The most direct way to judge is to check the number of hosts currently connected to the wireless network displayed on the router management interface. First, log in to the management interface of the router (the default management address of the router is 192.168.1.1), click Device Management, and check whether there are unfamiliar terminal devices among the connected devices:
If the guest network is enabled, you can click Device Management >> Guest Devices to see if there are connected devices:
Check to see if any unfamiliar devices are connected to the guest network.
It is recommended not to enable the guest network. If you need to enable it, be sure to set the wireless password of the guest network.
If you find that there is an unfamiliar network rubbing device among the connected devices, click “Disable” corresponding to the device to add the device to the blacklist. You can click Device Management >> Banned Devices to view banned devices:
If it is a traditional interface, click Wireless Settings >> Wireless Host Status to view the number of currently connected hosts, as shown in the figure below.
For example: In the use environment, you confirm that only 2 wireless terminals are connected to the wireless network, but the wireless host status shows that the current number of hosts is 3, which means that your wireless network has been hacked.
How to prevent being hacked?
1. Set up wireless network
 Set wireless encryption. Our current new interface (cloud routing) wireless router uses WPA-PSK/WPA2-PSK encryption by default. Please log in to the management interface of the router, click on the network status, and set the wireless password. It is recommended to use a combination of letters, numbers and symbols, and The length should preferably be no less than 12 characters.
If it is a traditional interface, log in to the management interface of the router, click Wireless Settings >> Wireless Security Settings, as shown below:
 Set wireless MAC address filtering. If the terminals using the network are basically fixed, and other people will not often access the wireless network, it is recommended to enable wireless MAC address filtering to allow only devices of all family members to access. Log in to the management interface of the router, click Application Management >> Wireless Device Access Control, click to enter, as shown below:
Note: Some routers do not support the MAC address filtering function at the moment, please refer to other anti-spoofing methods first.
If it is a traditional interface, log in to the management interface of the router, click Wireless Settings >> Wireless MAC Address Filtering, add the MAC addresses of wireless terminals in the usage environment to the allowed list, and enable the rule:
 Hidden wireless network. After hiding the network, others will not be able to find your wireless signal, reducing the risk of being hacked. Log in to the router management interface, click Routing Settings >> Wireless Settings, remove the tick in front of Enable Wireless Broadcasting, click Save, and the signal will be “hidden”.
After the signal is hidden, the device needs to manually enter the name and password of the wireless network when connecting for the first time. After the connection is successful, it can automatically connect to the signal in the future.
2. Use “net rubbing software” with caution
The hazards of a mobile phone with “net rubbing software” installed:
First of all, I cheated on my own wireless network, and shared it with the surrounding people in a daze; then I connected to the company’s wireless network and shared the company’s wireless network; I stayed in a hotel on a business trip, went shopping in a mall, and went to a friend’s house as a guest… Where did I go? Where is the pit.
Even if your mobile phone does not install the “WiFi master key” software, but there is no guarantee that one day a friend who comes to your house will install it on the mobile phone, and your wireless network will be secretly shared. The wireless password can be changed from time to time to prevent the network from being scrapped.
“Cuwang software” can realize “free Wi-Fi Internet access”, but it also has huge security risks. You don’t know who is in the same local area network as you, just like you don’t know what kind of person you are staying in the same room with. It’s good to be free, but it’s cheap and precious.
1. The new interface of the router does not have the MAC address filtering function, how to set it?
If the router does not have “MAC address filtering” or “Wireless Device Access Control” function, it is recommended to hide the SSID and use the guest network function. Hide the main network, only use the home equipment to connect; for ordinary visitors, just tell him the wireless name and password of the guest network. Terminals connected through the guest network cannot enter the router management interface, nor can they access intranet resources, so even if the guest installs the software, there is no threat to your main network. You can also choose to turn off the guest network when you don’t have guests.
2. What should I do if the wireless password is leaked?
If your wireless password has been leaked, it is recommended to modify the wireless name and wireless password, and uninstall the WiFi cracking/cracking software on all terminals to prevent it from being leaked again.
3. How to modify the wireless password?
See Section 1.1 (Setting Wireless Encryption) in the fourth part (How to prevent being hacked).
Note: If only the wireless password is modified, but the wireless name is not modified, the wireless terminal needs to delete the previous network configuration before connecting to the wireless network. It is recommended to modify the wireless name and wireless password at the same time.
4. If I have installed the Cracking Network software before, but now I have uninstalled it, will I still be caught on the Cracking Network?
If you have connected to the wireless network with a terminal installed with the software, even if the software is uninstalled, your wireless network information will still be “remembered” by the server of the software, so it will still be connected to the network. The solution is to modify the wireless name and password, and use a new wireless name and password.
5. It is inconvenient to bind the MAC address to the wireless used by the enterprise, and it is also impossible to check whether other people have installed the network software, what should I do?
In business environments such as enterprises, wireless networks can adopt the following strategies to ensure wireless network security:
1) Manage the network through the VLAN of the switch and the access control of the router. For untrusted areas, they should be isolated from the backbone network;
2) Adopt the AC+AP networking scheme to assist further authentication methods, such as Portal authentication (WEB authentication), WeChat authentication, etc., to prevent unauthorized customers from cheating on the Internet.