Wireshark, stealing passwords on free wi-fi networks

Today we're doing something special, we will try to intercept your login browser using a software called Wireshark extraordinary.
I'll show you how easily you can lose the password and username if you use when you log on public wifi networks.
These networks are the preferred target of hackers, they capture all traffic from that network after you login decode and extract data from Facebook, Twitter, and data from credit cards and more.
This tutorial is meant to make you pay attention to potential hazards that you may encounter when using an unsecured wi-fi network.
A simple walk through the old center in Bucharest, find dozens of hotspots, cafes and restaurants make most of free Wi-Fi. Unfortunately those networks are not configured properly and do more harm than good customer.
The free wi-fi networks:
1. Do not make online payments.
2. No login on facebook, twitter, gmail, yahoo, etc..
3. No discussion Putra private messenger or skype
4. Don't do compromising searches (you know)
5. Do not charge nothing of what you could do worse, if it gets public.
Be aware that antivirus will not do anything in this situation.


Cristian Cismaru: I like everything related to IT&C, I like to share the experience and information I accumulate every day. I'm learning to teach you!

View Comments (57)

  • Cristi welcome
    can monitor network traffic or whatever and from another pc?
    for showing us the PC that have not installed softu?

  • You could go further with the tutorial, to show us other tricks ...
    Believe me, as a tutorial that anyone not bored!

  • Please know that I can only SRI (newer baccalaureate) or State organs
    and they do not somehow?
    Does provaiderii net and they do so?
    and if they do not disclose personal data to you?
    is an interesting topic and very complex.

  • CostelinaHi Cristi can monitor network traffic or whatever and from another pc? for showing us the PC that have not installed softu?

    It looks like you do not understand anything in the tutorial.
    To make it easier: Go to a McDonald's, take a laptop with Wireshark installed and start scanning the traffic of those around you. So that means you can scan other people's traffic using that McDonalds's WiFi.

    • Adi, this tutorial is interesting but .... without definitely contradicting you, don't be upset ...
      I would never use this software. Argument: It's much too simple. Something makes me believe that if I floated something like this (with nasty intentions or simply out of curiosity), I would only succeed in losing some very important data myself. What the hell ... So anyone who sees this tutorial and uses this software woke up overnight ... hacker? Are you serious?
      If you want to use software out of curiosity but you have no idea what might happen to you and if you insist, at some point you will wonder how you lost your bank or bank account when you were. " the muther fucker of hacking ". Hum ....

  • FaqTak: You could go on with the tutorial, you look to us and other tricks ... Believe me, as a tutorial that anyone not bored!

    We do not want to go in details, it was just a demo for those using public networks.
    The world must know what can happen.

  • if you are already logged into yahoo, facebook etc. I can see the passwords. I mean I do not write them on the phone because they are already stored in your phone's browser

  • stefan: If you are already logged into yahoo, facebook etc. I can see the passwords. I mean I do not write them on the phone because they are already stored in your phone's browser

    You type in the browser for you is the same thing.

  • Keep an eye on videotutorial.ro. Tomorrow I will post a tutorial that will protect us in such situations, some methods ...

  • I would like in the future if you can make time for mini operating system (one of the bios) if wifi
    you say
    thank you

  • Hello, I have a question if you can.
    You put on an ipod 4g Wireshark? and see the traffic on it? meaning you do not necessarily have a laptop.

Related Post

This website uses cookies.