Easy as boiling water or how school WiFi networks are crackable (message for all IT teachers)

Hello, this message is for the teachers that teach IT in schools, because many teachers don’t even understand what they are talking about. They don’t want to understand that someone from the students can get access to their network. I am a student in the 5th grade in one Bulgarian school and I understood that my teacher doesn’t care about school’s WiFi safety (for that I cracked the network).

I wrote this message, because I understand that the same students that got the WiFi password will be distracted from the learning process, instead of this they will waste their time for watching YouTube or doing some other things in Internet.

Now I am going to explain how to get access to the network and how to protect your wireless network.

First of all, the easiest (and in the same time the hardest) method to get access to your network is using a client that’s connected to your network. After taking access to the client you go to the control panel of your router. The defaults for TP-LINK are 192.168.0.1 or 192.168.1.0 and other combinations. But here we have a small problem. After entering the control panel login screen you can get confused, because you don’t know the login or the password (many schools them default), so, you go to routerpasswords.com and find the default login and password. Next thing you need to do is to go to the “Security” section and see the password 🙂

Now to save your network “unhackable” from students like me, the first thing you must do is making a safe password.

To make it you can use MD5 for encrypting some phrase like “The quick brown fox jumps over the lazy dog” and then you can use the encrypted phrase like a password. Then you need to be sure that you are using WPA2/PSK encryption protocol.

Then you must change the default login and password for the control panel, because that can be your last resort for getting access to the router (except bruteforce and packet interception).

And that’s all for now! Thank you for reading!

read original article here