Today, Iβm going to talk about WAP security and why itβs important for you to implement it for both home networks, ESPECIALLY HOME NETWORKS, as well as corporate infrastructures. We often overlook this, which can lead to a MASSIVE SPOF that can lead to a massive scaled botnet if weβre not careful with implementing proper WAP endpoint security measures. I specialize in networking overall so I have a lot of fun messing around with penetration testing regarding them.
π Article π Glossary π Catalog π Home π Search ModeToday, Iβm going to talk about WAP security and why itβs important for you to implement it for both home networks, ESPECIALLY HOME NETWORKS, as well as corporate infrastructures. We often overlook this, which can lead to a MASSIVE SPOF that can lead to a massive scaled botnet if weβre not careful with implementing proper WAP endpoint security measures. I specialize in networking overall so I have a lot of fun messing around with penetration testing regarding them.
I'll be discussing the following topics in order: π Premise π What is a WAP? π What is SPOF π Your WAP aidβs hackers You can click on any of the topics to simply check that one out if it interests you! NOTE: Articles are read from LEFT to RIGHT via 2 columns! Read the first column all the way down and then move to the next one!
Here's a quick run down on all the main links that are in the article in case you want to check them out first. π LinkedIn Version π Patreon Version
Iβm also going to talk a bit about the various creative ways threat actors can exploit an access point to do some serious damage and a lot more. Of course whistles Iβm just theorizing. Itβs not like Iβve been paid to do this stuff before right hahaβ¦. cricket noises.. AHEMβ¦ back to the point of the matter!
Iβm also going to talk about what SPOF is since itβs a CRITICAL topic that youβll often come across in Cyber and Information security, WHICH YOU NEED TO KNOW. Itβs so important that simply not knowing it is one of the MAIN reasons why we have so many security breaches and bad Cyber Security practices.
Lastly, since this is of course the danger series, I am going to address MANY remedies that can be done in order to enhance your overall network security, most of which you probably have never thought of in the first place. Iβve played around with a lot of this stuff, so do take my word for it.
This article is a part of the Danger! Series, which is where I raise more Cyber Security awareness about critical flaws and vulnerabilities that exist within various system infrastructures, including any protocols and data communication methods, and the Dangers of what could happen should they be exploited to the fullest extent. I also go over various mitigation strategies that can be used to prevent them as well. If by chance there is an exploit video for me showing the full potential risk, it will be included in the advance version of this article for PAID patreon members only!
WAP, which stands for wireless access points, are the various gateway networking devices that we use to access various local networks including the internet: routers, hubs, switches, etc. They host various endpoint devices: laptops, desktops, mobile devices, CCTV systems, that are able to communicate with each other on the network via various networking protocols like TCP/IP for example, allowing them to exchange various data packets in order to communicate. Think of WAPβs, in the case of this article, like your βhouseβ, where you are trying to βprotectβ it. You still following me? Good!
SPOF, which stands for Single Point of Failure is when one endpoint or vulnerability leads to a SIGNIFICANT compromise of a multitude of systems in an infrastructure(s).
For example, the common element of a human factor via phishing and social engineering. It doesn't matter how many security factors you have at play, if even ONE person screws up and lets the threat actor in, then it is all for naught, hence it is a SPOF.
Letβs try another factor, but this time a bit more technical. Letβs say you happen to have multiple endpoints with application systems on them facing each other, many of which have access to each other's resources, even the most critical ones. In the event should ONE of these systems, or even if it were a singular system that was connected to everything in the same manner, it would lead to a MASSIVE SPOF that could do some heavy damage to the infrastructure.
Now that weβve gotten that out of the way, letβs dive into the main dangers that could happen should a your WAP happen to be compromised.
Anonymity is one of the biggest assets for a threat actor. It allows them to go undetected and remain untraced. There are NUMEROUS ways to go about this: burner phones, burner laptops, tor, FREE wifi spots, etc, BUT, did you know that YOUR AP(Access Point) can be used as a means to allow threat actors to keep their anonymity.
Now this doesnβt sound too bad right? Someone wants to use your wifi without your consent, not a big deal! WRONG! It becomes a HUGE deal when what they are doing is being traced back to YOUR location and IP address. Even if you are innocent, if the odds are law enforcement tracks back malicious activity to your IP address you suddenly are thrown under the bus by something you didnβt do.
Everything Iβm saying is a COMMON tactic that hackers use to stay off the radar. If you use someone elses WIFI, it even letβs you do the one thing threat actors should NEVER do, which is hack from the comfort of your own home.
If you like to see the more advanced version of this article that talks about methods that can be used to mitigate, as well as any videos included, SUBSCRIBE TO MY PATREON CYBER SECURITY TIER!
If you enjoyed this post give it a thumbs up! Iβll be keeping track of whose reacting from now on as there is a βspecialβ reason for it. Just know the more you support my content the more there is in stored!
- The Hacker Who Laughs πΈπΈππΈπΈ