This Is How I Hacked My Neighbors Computer

Not only websites and companies get hack, A real life story

c0d3x27
c0d3x27
Nov 26, 2020 · 4 min read
Image for post
Image for post
Photo by Azamat E on Unsplash

Disclaimer: This a person I’m friends with and I'm not telling you how to hack yours

Intro

Set-up

Accessing a wireless network

WEP

WEP (Wired Equivalent Privacy) is a security algorithm for IEEE 802. It was developed with the intention to overcome the data confidentiality issues with the traditional wired connection. It gave better data protection by encrypting the data transmitted to avoid eavesdropping.

All In

$ nmap 192.168.1.* 
$ ssh admin@192.168.1.1
The authenticity of host '192.168.1.1 (192.168.1.1)' can't be established.
ECDSA key fingerprint is SHA256:**********************************************.
Are you sure you want to continue connecting (yes/no/[fingerprint])? yes
Warning: Permanently added '192.168.1.1' (ECDSA) to the list of known hosts.
admin@192.168.1.1's password:
********************************************
* D-Link *
* *
* WARNING: Authorised Access Only *
********************************************

Welcome
DLINK#
********************************************
* D-Link *
* *
* WARNING: Authorised Access Only *
********************************************

Welcome
DLINK# show #press "Enter" twicealg date-time deviceinfo dlna driver-log
dsl dyndns hosts ip nas
phy-interface ppp qos sntp system
upnp version wifi-channel wireless
DLINK#

General types of attacks

InfoSec Write-ups

A collection of write-ups from the best hackers in the…

Sign up for Infosec Writeups

By InfoSec Write-ups

Newsletter from Infosec Writeups Take a look

By signing up, you will create a Medium account if you don’t already have one. Review our Privacy Policy for more information about our privacy practices.

Check your inbox
Medium sent you an email at to complete your subscription.

c0d3x27

Written by

c0d3x27

🐵Top Writer |Cybersecurity|YouTuber| Gym rat| Sport Bike Rider by day, Bug Hunter by night |#InfoSec #BugBounty #Fitness #Gym #Programming #Coder

InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. In a nutshell, we are the largest InfoSec publication on Medium. Maintained by Hackrew

c0d3x27

Written by

c0d3x27

🐵Top Writer |Cybersecurity|YouTuber| Gym rat| Sport Bike Rider by day, Bug Hunter by night |#InfoSec #BugBounty #Fitness #Gym #Programming #Coder

InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. In a nutshell, we are the largest InfoSec publication on Medium. Maintained by Hackrew

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store