I've Been Hacked is the most trusted Network & Security company on the coast. We have over 30 years experience in all things IT, serving major corporations such as Dreamworld & Newscorp Australia, as well as 5000+ general clients.
Most people when they consider security, they are more likely to invest in personal device security, which is great. But what they might not consider is there is a wide open gateway with their internet connection that can leave some of these security features redundant. We have seen first hand how quick & easy it is for the right hacker to take over your network & create widespread monitoring, active hacking & harassment.
There are many methods to compromising routers, some that you would never know that it is compromised.
Brute Force: The process of targeting a router with continuous, repetitive password combinations. Often this can supplemented with knowledge of the target routers make & model which may even have a generic password convention
Denial of Service: A form of brute forcing where the target is overloaded with data to the point it where the router crashes. Hackers can then sniff for authorisation handshakes with existing networked devices.
Deauth Attack: A similar tactic to Denial Of Service where instead a networked device is targeted & sent a particular type data packet continuously to kick it off the network. Then when the device attempts to reconnect, the hacker also sniffs for the authorisation handshake.
API Hacking: A new more uncommon attack method. Some ISP routers have web application based systems that are responsible for providing remote support & issue commands to router units. This is usually used for diagnostic & support measures, but there have been hackers who have been able to hack the ISP's system & exploited it to issue commands to a customers router including changing wifi names, viewing devices, issuing new passwords & more.
Once a hacker gains access to your network, they may be able to get access to the administrative control of the router. This can be used to loosen security, attack devices & monitoring them.
One possible configuration that can be disastrous is the manipulation of Domain Name Servers or DNS. This particular setting is usually defined by your ISP but in most routers can be manually changed to whatever you desire.
DNS servers is designed to convert your web query into an IP address. For example when you go to the website google.com, your system contacts the web server at the address of your DNS settings to ask what IP address has google.com. This may respond back with 172.253.118.100. Your device then requests the web page from this IP address in order to give you the website.
Obviously, when we can trust the DNS server to point to the correct location, you are safe from manipulation. But, if a hacker changes your DNS server to one they control, they can point your website queries to entirely different locations. So when you go to google.com, the website may not even be google & may have malicious code for hacking or monitoring you.
Securing your network is 75% down to having the right equipment in place. Unfortunately, our internet service providers do not consider all breach possibilities when they supply you a router. Some even take massive shortcuts & provide you with routers that are extremely weak in security. In order to know you are safe, you need to have a custom configured router that prevents any of the described methods from being applicable to you.
For more extreme cases, you may even want to consider removing more vulnerable technologies like WIFI & convert to a full cabled setup. With this configuration you are immediately protected from most brute force & deauth type attacks & your data is not being broadcasted in a local vicinity.
We can provide a fully personalised solution to your requirements to make sure you are safe & your network is essentially unhackable.
The most important thing you must do is turn off your network. Any malware or backdoor access from a hacker can still pass through the network and cause significantly more damage. Then get in touch with one of our expert team to get some professional advice on getting your network & devices evaluated.
Network audits are very in depth & can take varying pathways based on your setup and what we are able to find. However, some of the main tasks we perform include malware scanning, penetration testing, social protocol investigations, firewall inspections & much more.
Generally speaking, wired has better speeds over larger distances. However, since internet speeds are lacking significantly in Australia, this almost always becomes irrelevant for home internet. To get the best out of home file sharing however, you may want to use wired connections to have maximum file sharing speed.
We are located in the heart of Southport at the address 15 Welch St, Shop 8.
All Rights Reserved | I've Been Hacked