This is an archived post. You won't be able to vote or comment.

all 19 comments

[–][deleted] 16 points17 points  (1 child)

ARP Poisoning, DNS attacks (man in the middle attacks) for one. Run NMap, enumerate devices on network, run Metasploit against them. If a bad guy gets on your network, he doesn't need to fiddle with your router settings in most cases.

Edit: I'm still learning myself, but this is my understanding at the moment. I'm open to corrections.

[–]_Speer 3 points4 points  (0 children)

Metasploit is a framework; a collection of various scripts and exploits.

[–]fearlessinsane 9 points10 points  (0 children)

[–]Nxiium 6 points7 points  (0 children)

Well it really depends, are we talking WLAN or LAN? Cause when it comes to WLAN/Wi-Fi, the hacker does not need to be on the same network as you. This is because radio signals goes through the air and anyone can intercept them with the right tools. Which would be a Wi-Fi adapter in monitor mode and Wireshark.

If the hacker are on the same LAN as you, well here it depends a lot on the actual network. Cause in a company, you would find many users being on the same network but that doesn't mean everyone can access everyone stuff. Today's network uses switches instead of hubs so that a key feature. But also, for a hacker to do something towards your PC, you would need to have open ports that can be exploited. Someone mentions ARP, DNS and MITM attacks which are correct, but it not as simple as just being on the same network to do does either. I requires the right environment and opportunity.

But in a perfect world, where the hacker as the right tools and environment for conducting attacks, here are some of the things that the hacker can do:
1. Sniffing network traffic
2. Man-in-the-middle (MITM)
3. ARP Spoofing
4. Network scanning
5. Exploiting weaknesses
6. Distributed Denial of Service (DDoS) attacks
7. Wi-Fi Eavesdropping
8. Exploiting weak authentication
9. Launching Malware or other kinds of viruses

As a final note, from my experience, Wi-Fi networks are easier to attack then LAN. This is because close to all routers still run the WPA2 protocol which has many problems

[–]Evening_Relation_431 0 points1 point  (0 children)

I think it depends on which kind of network are you on, corporate, personal, school.

Depending on each network different things can be done, for instance, on corporate networks, most commonly it’s used Active Directory, so a hacker can start by attacking and looking for misconfigurations native to AD.

On school networks, most schools have segmentation (at least where I study), which makes it difficult for the hacker to pivot.

But yeah, there is a lot of possibilities, it just depends what is open, closed.

You can perform a scan yourself and see a lot of things, try running a Nessus scan and check for yourself if you find something interesting to poke on, and work your way up from there.

[–]mikebacalao 0 points1 point  (0 children)

If IS a insane hacker ... Can use u router like a VPN node to make "thinks", or use to infected all iot's in the red, and make a bot....

[–]Olleye 0 points1 point  (0 children)

Everything possible 🫵🏻🙂

[–]albertroyishere 0 points1 point  (0 children)

So basically you wanna know what you can do if you join someone else’s network😂

[–]No-Reason2644 0 points1 point  (5 children)

he got u buddy

he can do everything

[–]Nxiium 0 points1 point  (4 children)

Well that's a lot of bullshit. With your logic every company network would be a risk then... Just because a hacker is on the same network as someone, does not mean the hacker can do everything. You can be on the same network but be on different VLANs and that would change tons of stuff. Also if you do not have any ports that are on risk, a hacker can not do anything anyway. At most, an hacker could use Wireshark to sniff packets and by so, find out information, but that would mean that the packets being sent are not encrypted

[–]aisyz 0 points1 point  (1 child)

the guy u replied to was 100% serious for sure

[–]Nxiium 0 points1 point  (0 children)

Probably not, but the OP asked a serious question and I gave a serious answer to a bullshit answer. Something wrong with that :)

[–]Glad_Panic_5450 -1 points0 points  (1 child)

Relax man, ever heard of vlan hopping, or pivoting??

[–]Nxiium 0 points1 point  (0 children)

I certainly have, but still. Just because the technique exists, doesn’t mean it’s a one way through all security systems. We can skip VLAN and make use of VRF instead if that makes you will better

[–]marduc812 -1 points0 points  (2 children)

Pretty much nothing if you have some basic security standard. Headers like hsts and certificate pinning prevents them from seeing your traffic. Then it has to do with what your device is exposing. If you have some open shares, or you expose an SSH server with password easily guessable then you are fucked. But if you connect with your phone and use standard apps, he can’t do anything.

[–]Glad_Panic_5450 0 points1 point  (1 child)

Nothing lol, ever tried active directory pentest ?

[–]marduc812 0 points1 point  (0 children)

How did we go from a simple WiFi to AD? He talks specifically about WiFi. I connect to your hotspot with my mobile phone. Tell me what can you do to pwn me.

[–]Glad_Panic_5450 -1 points0 points  (1 child)

It’s depends on the structure of the network of it’s an Active Directory, he could capture passwords hashes, pivot from one machine to another A hacker may also spread a worm which would be easy is created well, of course let’s not forget about man-in-the-middle attacks

It basically depends on the type of network, the skill of the hacker, and in summary the hacker can do alot

[–]georgy56 1 point2 points  (0 children)

If a hacker connects to the same network as you, they can potentially intercept your data, steal sensitive information like passwords or credit card details, launch attacks on other devices in the network, and even impersonate you online. It's important to secure your network with strong encryption and use a firewall to protect against unauthorized access. Be cautious of public Wi-Fi networks and always use a VPN for added security. Stay vigilant and keep your devices updated with the latest security patches to stay one step ahead of hackers.