Using public hotspots are not safe,why? Let us explain that why using public hotspots are not safe. In this information technology era we are surrounded with electronics devices like computer’s, smart phones and Ipod’s etc. And people’s use’s internet for communication. No doubt these devices and internet is helpful in our daily life but increasing in internet crime’s becoming a major issue now a day’s. In this article we will talk about how public hotspots are not safe and why you avoid them. You might also want to read these great articles on the best hacking books and Malware Analysis. Sniffing on the WLAN: Sniffing is like intercepting in a communication and this is a powerful attack on Wireless lan (WIFI). Consider a scenario in which you are connected to a hotspot and you are doing some online banking and on that same public hotspot an attackers is also connected and he is doing sniffing on the network then he can see all the information in plain text you have entered on the website of the bank but only if the bank is not using Secure socket layer (SSL). So whenever you open like a bank website then make sure your connection is encrypted, to verify that check your browser is your browser has green lock like this If in the browser you see https with green color before the www.example.com then your connection is encrypted and there is not too much risk involved but if the connection is not encrypted then your account maybe got hacked by attacker who is on same WIFI hotspot. Man in the middle attack: As the word suggest man in the middle, yes in this attack an attacker become in between you and your original host and all the traffic go through via attacker machine below is the image which explains how this attacks works. As in the above diagram we can see that all the traffics is going through via attacker machine so he/she can capture and read all the information being share by you with your host. Like if you are logging in then your ID and Password maybe captured by the attacker. This is how man in the middle attacks works. Exploit the machine: On WIFI there are many possible way’s to exploit a machine like you are connected to a public hotspot and the attacker is also connected to the same hotspot now he can run a network scanner and can know the IP’s of the machine’s connected on that specific hotspot. The attacker will run another scanner which will find open ports and do operating system finger printing for this purpose attacker’s uses NMAP which provide all the information when started on an IP. If you are using old operating system like windows xp, windows 7 then there are 90% chances that your machine can be hacked and if you are little updated and using windows 8.1 and so on then there are 60% chances that you can be hacked by the attacker. After scanning the attacker will exploit those vulnerabilities which he/she have found using scanner but to exploit vulnerabilities he/she will use metasploit which have exploits for almost every operating system and server etc. However we recommend whenever you connect to a public hotspot keep in mind that maybe you are being scanned for vulnerabilities. Session Hijacking/Cookies stealing: This is another attack which can be performed by attacker on public hotspot. Some websites uses sessions and cookies to authenticate a person to avoid logging in every time. This help’s user’s to save but it opens a door for hacker’s to attack. Consider a scenario in which attacker is connected to the same hotspot which you are using he can rum tools like wireshark to sniff the traffic and then he can find the session or cookies in that captured traffic by just typing a small command. And then he/she will go to that website where that session or cookies belongs and will inject the session values or cookies values and he/she will be able to logged in to your account. Phishing: Phishing is the most easiest and very powerful attacks but now a day’s it’s not work too much due to awareness in peoples about this attack, however this attack has very old history and still popular for newbie hacker’s and there are also some website’s providing fake page services for phishing attacker like 1fake.com etc. In phishing attacker send a link to the victim like he/she may ask his/her friend to like his page but when the victim click on the link he got login page of facebook as soon as he enter the username and password all the information will be stored in the hacker server or mailed to him/her. This type of attacks is also can be performed on a public hotspot. To remain secure from these type of attacks always check the URL to verify that the website address is original not fake. Conclusion: After discussing these 5 types of hacking scenarios we recommend that avoid to use public hotspots, and use only when necessary. Remain secure and enjoy the wonders of technology.