- Unifi
- How To Crack Unifi Wifi Fully
- Unifi Wifi Setup
- How To Crack Unifi Wifi Full Version
- Unifi Wifi Malaysia
Cracking Wi-Fi passwords isn't a trivial process, but it doesn't take too long to learn—whether you're talking simple WEP passwords or the more complex WPA. Learn how it works so you can learn. See full list on keithrozario.com.
Getting decent WiFi coverage at my house has always been a challenge. The house is three stories (the bottom floor is a daylight basement) and has a footprint of 50′ x 100′. A four car garage extends the footprint even farther to the south, and because I use WiFi-controller irrigation controllers and look things up on my phone while performing auto maintenance, I need good WiFi signal in the garage, too. We also spend a lot of time in the summer in the back yard, so I also want WiFi coverage outside. I’ll be the first to admit it’s a #FirstWorldProblem, but with four kids and a spouse who love their mobile devices just as much as I do, it’s a problem I need to solve.
In the early days of wireless networking, I used a non-wireless Linksys BEFSR41 router with a single Linksys WAP11 to provide 2.5GHz Wireless-B access to the northern half of the house, which included my home office. Believe it or not, you can still find both the Linksys WAP11 and the Linksys BEFSR41 on Amazon… though I honestly can’t imagine why you’d want to. Both devices have been replaced by newer and faster technologies. My first upgrade was to move to a Linksys WRT54G Wireless-G router, which is arguably the most popular consumer-class WiFi router in history. Using third-party firmware like Tomato and DD-WRT, I was able to extend the capabilities of the WRT54G router, and configure four additional units as access points throughout the house to get (mostly) full coverage.
When Wireless-N became the latest technology, I upgraded to the Linksys E4200 dual band router, which broadcast WiFi over the traditional 2.4GHz band, as well as the less-congested 5GHz one. I still needed additional access points throughout the house to get full coverage, so I used a four Belkin 2.4GHz access points to fill the gaps. That meant I had a total of 5 devices transmitting WiFi signal throughout the house.
Using multiple access points throughout the house has its drawbacks. For the best performance, they each have to operate on a separate wireless channel… which isn’t as easy as it might sound. With so many access points available, our mobile devices would often get “confused” about which access point to talk to, and I also could never get the Belkin units to be as reliable as I wanted, even though I constantly tweaked the settings. Taking one or two out of the mix wouldn’t work, since that would leave dead spots in the house. Finally, I decided to stop using consumer-class WiFi devices and step up to industrial-strength wireless products… like the kind used in businesses, hotels, convention centers, and other locations that needed to reliably cover large areas with rock-solid WiFi.
I’d first discovered Ubiquiti wireless devices back in 2013, when I wrote a blog post about configuring one of their outdoor wireless antennas to work with iPhones. I’d purchased one of their small NanoStation LOCO M5 antennas to provide WiFi coverage in the back yard of our cabin… and was floored by its WiFi performance when I still had a strong signal out in the middle of the lake. I’ve been a fan of UBNT products ever since, so when it came time to get a “bigger hammer” to solve my residential WiFi problems at our main house, Ubiquiti felt like the right way to go.
Ubiquiti’s UniFi line of products offers their enterprise-level high-performance WiFi products, including their UniFi Access Points (known as UAPs). And even though Wireless-AC is currently the “latest and greatest,” it’s still in its infancy, and I don’t find it reliable enough (yet) to deploy. So I opted for the UniFi UAP-PRO Enterprise access point, which supports all wireless protocols up to Wireless-N, and broadcasts on both the 2.4 GHz and 5 GHz bands. At a retail price of $229, it isn’t cheap… but I haven’t regretted the purchase for a minute. Plus, they look awesome, like a flying saucer:
Unlike most residential wireless routers, the UAPs don’t act as a router. They’re just an access point, meaning you’ll still need to keep your existing router running (though I’d disable its WiFi access, which I’ll address in a minute). Also, unlike most residential routers, it’s not a simple “plug and play” install. This is a professional device, and Ubiquiti assumes that a networking professional is installing it. You’re going to have to jump through some hoops you may have never encountered before, and even with this blog post to help you, it might not be a bad idea to bribe one of your geeky friends to help you out.
What’s the Difference Between the UniFi AP (UAP) and UniFi AP-PRO (UAP-PRO)?
So what’s the difference between the Ubiquiti UniFi UAP vs. the UniFi UAP-PRO? The easy answer is “about $130.” But what you probably care about is whether it’s worth spending $79.99 MSRP for the UAP (or around $70 on Amazon) vs. $229.00 MSRP (or around $200 on Amazon) for the UAP-PRO.
Visually, the two units look identical — except that the UniFi UAP’s LED light ring glows green when it’s happy, while the UniFi UAP-PRO glows blue.
In an “optimal environment,” both units have a 2.5 GHz range of up to 400 feet, but the UAP’s max speed in that band is 300 Mbps, while the UAP-PRO supports 2.5 GHz speeds of up to 450 Mbps.
But the biggest different is that the UAP only has a 2.5 GHz antenna, while the UAP-PRO has both a 2.5 GHz and a 5 GHz antenna, meaning it also supports 300 Mbps speeds in the 5GHz range. And because the UAP-PRO is more powerful, it runs on 48V power while the standard UAP runs on 24V power.
In general, operating in the 5 GHz range is almost always superior to the 2.5 GHz range, particularly in neighborhoods where other WiFi networks exist. The 5 GHz channels are much “wider,” and therefore the 5 GHz range is far less congested, meaning there’s less interference and you’re fare more likely to achieve the maximum speeds due to reduced interference in that frequency range.
If you only have one or two wireless devices in your house that support the 5 Ghz band (newer mobile devices like iPhones, iPads, Android phone and tablets, or most modern laptops), then you’ll probably be fine with the standard UAP. But because we have a large family, all of whom have multiple 5 Ghz-capable devices, it was worth the extra money for the UAP-PRO.
In most instances, I recommend the UAP-PRO over the UAP. But if you think you’ll be OK with just the standard UniFi AP, go ahead and get it. However, if any part of you wonders if you’d regret not having the 5 GHz capable UniFi AP Pro down the road, or if you have a lot of Apple or Android devices in your family, spend the extra money and run both network bands in your house.
Choosing the Ubiquiti UAP-PRO Location
To get the best WiFi coverage, you should locate your WiFi antenna in the highest and most central location possible at your house. For me, this is the hallway on the top floor, which is (thankfully) accessible from the attic. I have network cables running through my attic, but none of them actually plug in up there, so I had to clip one of them, put RJ-45 network jack ends on both sides of the cable, and plug both ends into a 5-port network switch (I recommend the Netgear ProSAFE GS105). That left me three open ports on the switch — one of which I’d need to use for the UAP-PRO, and the other two for future expansion. If your existing router is located anywhere near where you want to install your UAP-PRO, it will be easiest to run a network cable from any of the LAN switch ports (not the WAN port) of your existing wireless router to the desired install location.
Mounting the UAP-PRO to my ceiling was pretty easy. I centered it visually with the hallway lights, checked from the attic to make sure that space was open on the other side (no air ducts or studs), then mounted the included plastic bracket into the ceiling drywall using the included molly bolts and screws. I drilled a 1 inch hole where it’s open in the bracket, then fed a network cable down from the attic and let it hang there. I didn’t use the included metal bracket piece in the kit, because it’s designed for industrial acoustic ceiling tile.
Powering the Ubiquiti UAP-PRO
The UAP-PRO doesn’t have a separate power cord. It uses “power over Ethernet” (or PoE), which requires either a special type of switch that provides 48V of power over the Ethernet cable in addition to its network connection, or you can just use the included 48V power-injector (which I recommend). Here’s what the power injector looks like:
Ubiquiti 48V power inector
Because I like having my network equipment protected, I purchased an APC BE550G battery backup unit to plug into an available power port in the attic. I plugged my 5-port network switch into the battery backup, as well as the plug for the Ubiquiti power injector. I plugged the long Ethernet cable (that was currently dangling into my upstairs hallway) into the POE port of the injector, then ran a shorter Ethernet cable between the LAN port of the injector and one of the open ports on the 5-port switch. I now had power and network connection ready to go.
I went back into the hallway, and flipped the UAP-PRO over to expose the main Ethernet port, as well as the reset button and secondary Ethernet port:
I plugged the dangling Ethernet cable coming from the POE port of the injector in the attic into the Main/48V port. After a few moments, the LED ring on the front of the unit lit up, indicating that the unit was powering up. I pushed the cable up through the hole into the attic, and twisted the UAP-PRO into place on the bracket. It looked pretty cool!
Ubiquiti UAP-PRO mounted to ceiling
Configuring the Ubiquiti UAP-PRO
Remember when I said the UAP-PRO was not a consumer device? Here’s where that becomes an issue. The UAP-PRO doesn’t have its own a web interface to configure, so you have to install a piece of software called the UniFi Controller on one of the computers that’s physically connected to your local network or existing router with an Ethernet cable. You can download the UniFi Controller software (for Windows, Mac, or Linux) directly from Ubiquiti at this link.
You won’t need to keep the UniFi Controller software running all the time, but you will need to have it running to set up the UAP-PRO, or change any settings later (don’t worry… you probably won’t have to change anything later). I recommend running it on a desktop system, and again… it must be connected via a network cable to the same physical network as the UAP-PRO.
After downloading and installing the software, run it. It will take a minute to initialize. It’s actually setting up a private web server on the local computer that you’ll access with your web browser. When it’s running, it will prompt you with a button to “Launch a Browser to Manage Wireless Network” to access the Controller.
Your UAP-PRO will be in a condition called “Awaiting Adoption,” meaning it hasn’t been “adopted” by (or added to) any network yet. If the UniFi Controller software “finds” the UAP-PRO right away and attempts to adopt it, great. Just follow the steps in the wizard to get up and running: along the way you’ll have to create a new admin user and password (this is only to configure the UAP, and not the same thing as the network name or password required for devices to join the WiFi network), and you’ll answer some questions like what network name you want to use, what password people will use to access the network, etc.
But if the UniFi Controller software doesn’t find the un-adopted UAP-PRO, don’t worry. It didn’t find mine right away, either. Just keep hitting “Next” or “Skip” to get into the main Dashboard area of UniFi Controller. Once in the Dashboard, click on the Devices icon in the left column. If you see a UniFi AP Pro in the list waiting for adoption, go ahead and hit the ADOPT button. If you don’t see anything, look near the bottom of the screen and click the Settings icon. Then click the Controller menu item on the left side, and make sure “Make controller discoverable on L2 Network” is checked. Hit APPLY then the X at the top of the screen to go back to the Dashboard. Now go back to the Devices icon and see if your UAP-PRO is there yet. If it’s not, check all your connections, make sure it’s powered, and temporarily turn off the Windows Firewall (you can find it in the control panel). That might make it easier to find.
If you still can’t find it, there’s not much else I can tell you that will help, besides verifying everything I’ve explained to this point. Eventually, it will show up in the Devices list, and you’ll be able to press the ADOPT button. It will take a while for it to join your network. Once it does, go back into the Settings icon (at the bottom of the Dashboard) and go through the following Menu items:
Site: Choose any site name you want (like Jenkins House), then choose your Country and the local time zone. I recommend turning on Automatically upgrade AP firmware. Leave everything else at the defaults.
Wireless Networks: If the Controller didn’t auto-detect your UAP when it first started, you’ll have to manually set up your WiFi network here. Click the CREATE NEW WIRELESS NETWORK button. Choose a name for your network to broadcast (also called the SSID). It’s OK for you to use the same network name that you were previously using on your wireless router, and as long as you also use the same security type and password in the next step, all your devices should “just work.” Or, if you want to make a separate network name, you can do that. Make sure the Enabled box is checked, choose WPA-PERSONAL for the Security, and enter a Security Key (the password people will need to join your network). Don’t check the Guest Policy box, or worry about any of the Advanced Options. Press SAVE when you’re done.
Exit back out to the Dashboard with the X in the top right corner. If you click on the link of your UAP, you’ll see its status in the right column. It might say something like “Provisioning,” which means it’s saving the stuff you just set. It might also indicate that it’s updating its firmware, since you just turned on automatic firmware updates. If that’s the case, wait a few minutes for it to finish up. When it’s showing green and “Connected,” it’s ready for you to test.
The UAP-PRO should now be showing a blue LED ring, which looks especially awesome in the dark:
Disable WiFi on your Existing Router
Because the UAP-PRO is powerful enough to cover your entire house, I recommend disabling the WiFi broadcast from your current wireless router. You still need it to do its routing duties, so you can’t just unplug it from your network. You’ll have to sign in to the admin interface of your router (that will vary depending on your device), find the Wireless settings, and turn it to “off” or “disabled.” Contact your device’s manufacturer if you need help, or do a web search for how to do it on your particular device.
Enjoy Your Upgraded WiFi!
At this point, all that’s left is for you to grab your wireless devices and walk around the house marveling at how awesome your WiFi coverage and speeds are. You really will notice a huge difference. Go outside and test it there, too. I had planned to use a second antenna to blast WiFi into my back yard, but a single UAP-PRO covers more than enough area for our needs… even outside the house.
If you changed your network name, password, or security type, you may need to tell your wireless devices to “Forget” the old network and join the new one. But you’ll only need to do that once. You can close down the UniFi Controller software — it doesn’t need to be running for the UAP-PRO to work. But if you want to check the status of your WiFi antenna, or see who’s connected to it, you can run the UniFi Controller at any time.
If you’re reading this article and trying to decide whether to upgrade your WiFi coverage, I cannot recommend the UniFi UAP-PRO Enterprise access point highly enough (Amazon has the best deals on them). It’s one of the best purchases I’ve made all year. Since installing it, nobody in the family has complained once about WiFi coverage or speeds anywhere in the house. That’s worth the $200 right there.
Good luck, have fun, and enjoy your enterprise-class WiFi!
If you run into any trouble, I highly recommend checking out the Ubiquiti forums. I’m sorry, but I can’t answer support requests in the comments or via email. Contacting Ubiquiti directly, or using their excellent support forums, is your best option if you run into issues not addressed by this article.
But if you have other questions, comments, or feedback, I welcome it below!
More from this site:
With the newly enacted Evidence Bill Amendment, you would have been deemed to have published everything that originates from your IP address. What that means is that if someone hacks your Wi-Fi and then uses it to publish malicious or seditious statements online, you will be deemed to have published it, and the onus is on YOU to prove you’re innocence rather than for the prosecution to prove your guilt.
So obviously with the new law floating around, Wi-Fi security should be at the top of every Unifi Subscribers agenda–if it isn’t already.
However, how secure is your Unifi Wi-Fi connection?
The short answer is not so secure.
The brilliant blog Lifehacker recently posted an article on how you can hack Wi-Fi connections secured by a WPA or WPA2 password. The post is quite detailed but even I have to admit the technical skills neccessary to pull this off is somewhere between intermediate and expert. At the end of the post is a link to a spreadsheet detailing all the devices that are susceptible to this hack, and one of those devices is the DLink Dir-615 Wi-Fi router, if it doesn’t sound familiar let me refresh your memory–it’s the router that Unifi gives out to all Unifi customers!!! (que bone-chilling Alfred Hitchcock Movie sound)
Now taking aside the fact, that I could probably call all Unifi customers to request the Wi-Fi password printed at the bottom of their router, and 50% would probably provide that to me with no issue, this also means that for those people smart enough to hide their passwords — I can still hack your Unifi Wi-Fi connection no matter what you do on your router. There’s literally nothing you can do, hiding SSIDs don’t work and neither will MAC address filtering. Of course this is all theory, and testing this theory took a lot more time than I had, so I’m not sure.
What I am sure is that Unifi have their own firmware for the DIR-615 router, and that’s a partially susceptible router, meaning some firmwares are susceptible some firmwares aren’t, and it’s a coin toss and whether your router at home is susceptible.
Now, while I know of a few people who hack Wi-Fi passwords just for the fun of it,and there’s a lot of references and material online detailing the steps required–so we all know this works. In fact you can buy packages online that allow you crack the routers easily :). This blog written in Malay claims that they’ve successfully hacked a DLink Dir-615 router, I’ve no doubt it’s possible, but it’s not easy and it takes time.
Unifi
Either way though, it’s always good to remember this. There is no such thing as impossible to crack, merely inconvenient and infeasible. Don’t believe me? Check out this story of how a group of University Students manage to hack a US Military Drone in mid-flight using nothing more than $1000 worth of equipment, do you really think your Wi-Fi at home is more secure a ‘death from above’ US Predator Drone? Every Wi-Fi access point hackable, it’s only a matter of how much time, effort and money is required.
What if I don’t change my password?
If you don’t even bother, or don’t know how to change Unifi password of your router from the default 6 digits Unifi assigns to you, then it’ll be safe to say, that geeky neighbour kid is probably stealing your Wi-Fi.
This post demonstrates a real easy way to brute force hack a router. What that basically means is that the program will try every single possible combination for your router password, usually that will take weeks, however if you just use the 6 digit default Unifi password, then you’ve narrowed the search to just 1,000,000 possible combinations. For a human that’s a big amount, but a for a computer running Beini–it’ll take about 10 hours.
So for Wi-Fi there are 2 general rules, change the default password AND don’t use WEP.
The consequences of low protection
A lot of people don’t appreciate the importance of internet security and even few know how to properly secure things like the PCs, Wi-Fi and even online bank accounts. Some people I work with in my job, still think WEP is a perfectly acceptable way to secure a Wi-Fi connection…and I work in IT.
Naked Security (a fantastic blog to follow) details how a SWAT team Evansville, Indiana raided a house with flashbangs and grenades because the traced threatening blog post to the IP address of the house. The only problem was that the house was using an unsecured Wi-Fi connection, and it became pretty apparent that the 18 year old watching TV with her grandmother were not the perpetrators of the crime. It became even more apparent, that anyone within Wi-Fi distance of the house could use it to post those comments. Fortunately, the state of Indiana still believes in innocent till proven guilty and paid for the damages to the house cause by the flash bangs. In Malaysia, with the new evidence act amendment–you may not be so lucky.
In the past, the worst that stolen Wi-Fi meant was you would experience a slow connection because the neighbourhood hack geek was using your Wi-Fi to watch porn. Now it has far dire consequences that could include you being sent to jail.
How To Crack Unifi Wifi Fully
With the newly ammended Evidence Act it’s far worse. Anyone that hacks your router can use your IP address to post malicious, seditious and sensitive material online, and YOU would be held accountable for that post. So If I hacked your router, and it’s quite possible, then I could post a terribly seditious post online that would be traced to your IP address, and you would have been deemed to publish it. It’s up to you to prove I hacked your router, and if you don’t even have the know-how to secure your Wi-Fi what chance do you have a catching me?
To see how easy it is to hack a Wi-Fi network, check out the point and click steps here.
That’s bad.
That’s why you need to sign the petition here. http://www.tinyurl.com/stop114a to stop the Evidence Act Amendment from being gazetted into law. Do that now.
Last Words
Unifi Wifi Setup
I’m really peeved that Members of Parliament from both the Government and Opposition have passed this law, particularly the opposition MPs simply because they failed to do their job. As an MP you have just one job– to pass laws — and if you can’t even get that right you don’t deserve to be an MP!!. I don’t care if you were given 400 pages to read 15 minutes before the bill is tabled, if you have just one job, you ensure that you perform that one job exceptionally well.
Shame on you Pakatan, at least BN MPs can claim to be following orders. Pakatan MPs should be ashamed that it took a blogger to first break the news about the amendment, rather than the MPs themselves.
How To Crack Unifi Wifi Full Version
Finally I’m merely pointing out to you what is now general knowledge of every hacker on the internet. Showing you how to steal internet is likely to get me jailed or worst, banned from cable. I’m not pointing out how to steal Wi-Fi, I’m pointing out on an unsecured Wi-Fi connection at your home is now a dangerous thing.
Unifi Wifi Malaysia
Image of router rather ‘Maliciously’ taken from thePCHarbor, I hope they don’t mind. http://techblog.thepcharbor.com/?p=2477