Skip to main content

Create A WiFi Hotspot From A PC/Laptop (Windows 10/8/7/XP)


Creating a wifi hotspot from your system(PC/Laptop) is a cool trick that we can use to perform numerous activities depending upon the user. This trick can be used by both an attacker/hacker as well as normal people. Attacker can use it to create open networks. As we already know that open networks are dangerous and are not secured at all. Open network leaves traffic unencrypted and even attack such as man-in-the-middle based attackes are widely famous in open networks. This is one of the huge trust issue with open networks hence it is always suggested not to connect to an open network such as public wifi. Similarly, normal people with good intention can also use it to create a hotspot of the connected network on which several other people can connect. It is a very simple and easy trick that can be done in couple of minutes. 
Step 1:- Open Command Prompt
Step2:- Type:- netsh wlan set hostednetwork mode=allow ssid=Nameofthehotspot key=password
In case of above example we created a hotspot by the name of 'whowantstouse' and have set the password/key as password.
Step3:- Type:-  netsh wlan start hostednetwork 
Step4:- Check if the network/hotspot is visible to anyother device or not.
As we can see that the cell phone is showing the network/hotspot 'whowantstouse' 

Step5:- After the hopspot is visible try connecting to the network using the password or else just connect to it if its an open network(if key is not set).
There is an error that popped up because the device says that internet is not available in the network/Hotspot.

Step6:- The hotspot might not work cause we have to do some changes to our original network properties. In order to do that type 'ncpa.pcl' in run(win+r) or can directly go to ControlPannel-> Network and Internet-> Network Connections.

Once redirected to the particular place left click in the original network and click on properties.

Once clicked on properties go to the shared tab and tick mark on the allow other network option and select the hopspot network from the dropdown list. 

Step7:- Try connecting again through another device and it will work smoothly.

If you have any query regarding this please leave a comment down in the comment section.

Comments

Popular posts from this blog

Wireless /Wifi(WEP/WPA/WPA2) Password Cracking Using Dictionary Attack With Aircrack-ng (Kali Linux)

Tools Used:-Aircrack-ng In the present context of networking, WEP is not used cause it is the weakest and easy to crack through the network. WEP/WPA2 are the most used encryption tools to secure the wireless connection.   The most common way of getting past or cracking through WEP and WPA secured wireless connection is through the use of captured handshake. When you want to hack wifi, you need to capture “handshake”. The handshake is the connection of personal computer and wireless network, it is when network packet and personal computer packets meet each other. If you capture handshake then with a handshake you do not need to be in wifi range anymore, you can hack password with handshake and wifi name. Now you need to capture all the packets that are sent through the wifi router and all personal computers in the network . Step1: airmon-ng  This step is done before anything else is done in order to know your wifi interface name. Check the running process and  ...

Making Own Dictionary Using Crunch Commands For Dictionary Attack (Kali linux Tool)

Making own dictionary from words not listed in the normal English dictionary can be helpful specially for people who want to crack passwords based on some person's name, surname or native language words( Example Nepali word, Hindi Word etc). Since most of the word list that are used to hack into a system or crack passwords contain words from English dictionary, passwords such as name of person, surname of person, pet-name and specially words of native language aren't included in that word list as they aren't defined in the English dictionary. This is one the most crucial drawback of dictionary attack. Apart from selective words problem, dictionary attacks usually take lot of time cause they attempt all the words present in the word-list as passwords to crack the authentication system. If we make our own dictionary then it will also help in saving time. But making our own dictionary can only be helpful to only those people who have a hint to what the password might be an...

SQL Injection Attack Using SQLMAP Tool In Kali Linux

In current context of digitized  world where everything is done over internet, lot of information can be found online. The data can either be private to people or can be public to everyone with no privacy. Everyday lots of data are getting stored in different databases of different websites throughout the world and it is becoming harder to store and protect the data from evasion at the same time. Unauthorized access to such databases can lead to leak of large amount of confidential information related to a person or even an organization. Hackers tend to steal a lot of information through such database by getting either getting authorized or unauthorized access. One of the most common method to get an access to the information's available in a websites database is SQL injection based attacks.  SQL Injection is a type of an  injection  attack that makes it possible to execute malicious SQL Statements.  With the right set of queries, a user can gain access, u...