You don’t have to dive too deeply into the dark web to discover all sorts of ‘interesting’ things. We’re not talking guns, drugs and credit card cloning, all of which are there, but hacking things.

The dark web is bubbling with sites and forums that provide advice, insight and tips on different hacking techniques with one in particular revealing how to hack Gmail using phishing techniques and Wapka.

Wapka is free website creation platform with free website hosting and for those who want to create a phishing website, it’s the “perfect platform,” or so we’re told.

Or if you want to code a remote buffer overflow exploit with Python that works with TCP only, then the same site is for you.
  • Put simply a remote buffer overflow exploit is the process of fiddling with a program’s memory to replace executable code with malicious code.
  • This sort of activity is usually done with C and C++ languages.
  • In contrast Python is a ‘high level’ language that offers hackers mouth-watering flexibility.

BullGuard protects your computer from hackers and malware

TRY NOW FOR FREE - 90 DAYS
 

Instructions on how to hack a router

We won’t name the site but we thought you’d be interested in one particular page that shows just how easy it is to hack a home router. The steps are as follows.

Get yourself:
  • A port scanner
  • Web browser
  • Internet connection

And you’re all set to go.
  • Select a range of IP addresses that you want to scan. We won’t provide tips on this but it’s fairly easy to figure out.
  • Using the port scanner scan for home routers within the IP range you have selected.
  • This scan will reveal IP addresses which have open ports
  • Taking the IP addresses one at a time and searching for them one at a time you’ll be taken to web pages that are actually the routers log in pages.
  • You’re then likely to see alert error messages that consist of numbers and letters and a message that says authentication is required.
  • You then simply carry out an internet search which is likely to lead you to webpages that provide the default admin and user name for the routers in question.
  • Given that most people don’t change their default router credentials the hacker has easy access to your home router.

We have deliberately obscured some of the information above and while it may appear on the surface a little complex, it’s actually surprisingly easy to hack a router.

What can hackers do if they break into my router?

  • A router doesn’t store any of your personal information directly, but sensitive data passes through it every time you access various online services.
  • This data can be stolen or manipulated if the router is hacked. For instance requests to access a specific website can be hijacked and the request sent to a site set up by the hackers
  • A compromised router can also serve as a platform for attacking other devices on your local network. This could be a baby monitor, a smart phone or laptop. 
  • A hacked router can also be used for launching denial-of-service attacks against internet websites.
  • This can get your IP address blacklisted and can slow down your internet speed.

In a follow up blog we’ll show you how to change your router’s authentication credentials so it can’t be hacked.