Places where people gather like malls, stadiums, and airports
These are locations where people tend to stay for a few hours or for the day, so we can assume that their devices aren’t protected. Look up the concourse Wi-Fi networks and sniff them out to find hotspots. Now locate an access point that you can access remotely, and do some geolocation testing.
Both of these types of locations are ideal to locate a poorly configured AP/router/wireless adapter with admin passwords. These types of targets also have no chance of providing information about the location or identity of the network operator.
These locations will also be much easier to attack than a consumer’s home or office. The density of the target population will mean more targets, and more targets will mean less time spent trying to guess the target’s location. Also, you’re likely to find weaker security and user behavior as you get closer to less sophisticated users.
If your goal is to learn about a specific company, keeping their internal wireless network under surveillance is much easier than monitoring the traffic from their public wireless access points.
Hospitals – they have a lot of valuable equipment and data that need to be protected
Most of the time, hospital Wi-Fi networks are directly connected to the Internet; this is not a very secure configuration, but you can use this to your benefit. Look up all access points that are available and search for channels with medium to low activity. Be sure to look for networks on the wider hospital networks (HN) and minor emergency networks. Once you have found them, consider making Wi-Fi hacking an everyday activity.
If you can’t find them, ask the administrator or other staff members. In a large hospital, it might be easy to find one with weak encryption or an unpatched operating system. If you can’t figure out where they are, then you probably don’t need this information yet.
You should ask yourself if they are in a location that will be more vulnerable and less secure after an attack. Hospitals have a lot of valuable equipment and data that need to be protected. This can create many different opportunities for you to try out your skills.
You also have to consider how people will react after the attack. If you get caught, it might be a good idea to plead insanity, just as Albert Gonzalez did in his own case.
Schools – children are often the target of cyber attacks
Most schools allow unrestricted access to the Internet from Wi-Fi hotspots, so they make a great spot to hang out. Once you have connected to the school’s Wi-Fi, try looking at the available networks on your laptop. Sometimes you can also find systems that are not password protected on the network. Use this information to identify the most unsecure networks and to avoid them.
Patching your computer and using antivirus software and an updated operating system are some of the best ways to secure your computer. If you don’t know how to keep your software updated, ask a parent or teacher for help.
Also, avoid opening attachments that come in e-mails if you don’t know who sent them. And remember, we are all more susceptible to viruses now because most people own a personal computer.
Research has shown that the younger you are, the more at risk you are of being a victim of a computer-based crime. According to the report, Internet crimes against children under 13 year old occur more often than in any other age group, with over 15 percent of those kids having encountered cyber-crime. And 80 percent of kids who have encountered cyber-crime got it at school.
Also, this is not only a problem for schools. Schools are giving you a tool to protect yourself called net nanny. It is a school filter that blocks websites and any other network activity, making it the safest place to go online.
Financial institutions – they store a lot of sensitive information about their customers
Hospitals, schools, and financial institutions are devices that store a lot of data on the Internet. Those with valuable information can make it available for malicious entities to gain access to their network. The best way to attack these organizations is to monitor them for months and get a feel for their network behavior. The following are ways to gain access to secure networks. Look for a web server that is using a tool called Wireshark and port scanning.
The best way to attack is to monitor the organization for months and get a feel for their network behavior. Know the protocol of the device you wish to compromise (to know what ports are available). Then, scan all ports on the public IP address found via Shodan, Netcraft or similar search engines.
Government buildings – they are a prime target for hackers because of all the confidential data they contain
Government buildings are a great target for hackers. Find out where it is located and if possible, collect the network’s SSID, name, and encryption type before starting an attack. Are there any security cameras nearby? Are there guards on patrol? What do they look like? Are they armed or unarmed? You should try to avoid attacking these networks if you can.
Title:Protecting Your Wireless Network (with BackTrack)
This article is a good read, it goes over Security and protecting your wireless network using Backtrack. This is an excellent read for those who are new to Hacking, or in to the wirless networking field. Here is an excerpt from it: “When I first started out hacking wireless networks, I used a lot of different tools. Sniffers, sniffers, sniffers. I had Access Points, AP clients, and even an AP repeater.
I eventually decided that I needed to replace all of the toolkits I relied on for networking. Now that I have switched over to Backtrack, my wireless hacking is much more organized.”