Futaba _ Webs πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

DANGER! Your WAP is a Single Point Of Failure! πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

Today, I’m going to talk about WAP security and why it’s important for you to implement it for both home networks, ESPECIALLY HOME NETWORKS, as well as corporate infrastructures. We often overlook this, which can lead to a MASSIVE SPOF that can lead to a massive scaled botnet if we’re not careful with implementing proper WAP endpoint security measures. I specialize in networking overall so I have a lot of fun messing around with penetration testing regarding them.

πŸŽƒ Article πŸŽƒ Glossary πŸŽƒ Catalog πŸŽƒ Home πŸŽƒ Search Mode

πŸŽƒ Article Glossary

πŸ•Έ Synopsis πŸ•Έ

Today, I’m going to talk about WAP security and why it’s important for you to implement it for both home networks, ESPECIALLY HOME NETWORKS, as well as corporate infrastructures. We often overlook this, which can lead to a MASSIVE SPOF that can lead to a massive scaled botnet if we’re not careful with implementing proper WAP endpoint security measures. I specialize in networking overall so I have a lot of fun messing around with penetration testing regarding them.

Disclaimer

As always, personal disclaimer, any and all information for this is strictly for educational purposes and I do not condone any form of illegal activity, nor am I responsible for anything you should use this information for. DO NOT pen-test on anyone's network unless it is your own, or you have permission to do so. Now, let's begin!

πŸ•Έ Article Topics πŸ•Έ

I'll be discussing the following topics in order:

πŸŽƒ Premise

πŸŽƒ What is a WAP?

πŸŽƒ What is SPOF

πŸŽƒ Your WAP aid’s hackers

You can click on any of the topics to simply check that one out if it interests you!

NOTE: Articles are read from LEFT to RIGHT via 2 columns! Read the first column all the way down and then move to the next one!

πŸ•Έ Key Links πŸ•Έ

Here's a quick run down on all the main links that are in the article in case you want to check them out first.

πŸŽƒ LinkedIn Version

πŸŽƒ Patreon Version

πŸŽƒ DANGER! Your WAP is a Single Point Of Failure!

Premise πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

I’m also going to talk a bit about the various creative ways threat actors can exploit an access point to do some serious damage and a lot more. Of course whistles I’m just theorizing. It’s not like I’ve been paid to do this stuff before right haha…. cricket noises.. AHEM… back to the point of the matter!

I’m also going to talk about what SPOF is since it’s a CRITICAL topic that you’ll often come across in Cyber and Information security, WHICH YOU NEED TO KNOW. It’s so important that simply not knowing it is one of the MAIN reasons why we have so many security breaches and bad Cyber Security practices.

Lastly, since this is of course the danger series, I am going to address MANY remedies that can be done in order to enhance your overall network security, most of which you probably have never thought of in the first place. I’ve played around with a lot of this stuff, so do take my word for it.

This article is a part of the Danger! Series, which is where I raise more Cyber Security awareness about critical flaws and vulnerabilities that exist within various system infrastructures, including any protocols and data communication methods, and the Dangers of what could happen should they be exploited to the fullest extent. I also go over various mitigation strategies that can be used to prevent them as well. If by chance there is an exploit video for me showing the full potential risk, it will be included in the advance version of this article for PAID patreon members only!

What is a WAP? πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

WAP, which stands for wireless access points, are the various gateway networking devices that we use to access various local networks including the internet: routers, hubs, switches, etc. They host various endpoint devices: laptops, desktops, mobile devices, CCTV systems, that are able to communicate with each other on the network via various networking protocols like TCP/IP for example, allowing them to exchange various data packets in order to communicate. Think of WAP’s, in the case of this article, like your β€œhouse”, where you are trying to β€œprotect” it. You still following me? Good!




What is SPOF πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

SPOF, which stands for Single Point of Failure is when one endpoint or vulnerability leads to a SIGNIFICANT compromise of a multitude of systems in an infrastructure(s).

For example, the common element of a human factor via phishing and social engineering. It doesn't matter how many security factors you have at play, if even ONE person screws up and lets the threat actor in, then it is all for naught, hence it is a SPOF.

Let’s try another factor, but this time a bit more technical. Let’s say you happen to have multiple endpoints with application systems on them facing each other, many of which have access to each other's resources, even the most critical ones. In the event should ONE of these systems, or even if it were a singular system that was connected to everything in the same manner, it would lead to a MASSIVE SPOF that could do some heavy damage to the infrastructure.

Now that we’ve gotten that out of the way, let’s dive into the main dangers that could happen should a your WAP happen to be compromised.

Your WAP aid’s hackers πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

Anonymity is one of the biggest assets for a threat actor. It allows them to go undetected and remain untraced. There are NUMEROUS ways to go about this: burner phones, burner laptops, tor, FREE wifi spots, etc, BUT, did you know that YOUR AP(Access Point) can be used as a means to allow threat actors to keep their anonymity.

Now this doesn’t sound too bad right? Someone wants to use your wifi without your consent, not a big deal! WRONG! It becomes a HUGE deal when what they are doing is being traced back to YOUR location and IP address. Even if you are innocent, if the odds are law enforcement tracks back malicious activity to your IP address you suddenly are thrown under the bus by something you didn’t do.

Everything I’m saying is a COMMON tactic that hackers use to stay off the radar. If you use someone elses WIFI, it even let’s you do the one thing threat actors should NEVER do, which is hack from the comfort of your own home.


portfolio img

If you like to see the more advanced version of this article that talks about methods that can be used to mitigate, as well as any videos included, SUBSCRIBE TO MY PATREON CYBER SECURITY TIER!

If you enjoyed this post give it a thumbs up! I’ll be keeping track of whose reacting from now on as there is a β€œspecial” reason for it. Just know the more you support my content the more there is in stored!


- The Hacker Who Laughs πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

portfolio img

πŸŽƒ CONTACT ME

AnOnYmOuS

futaba.webs@gmail.com

New York, NY United States