The Promised LAN

Share and earn Cybytes
Facebook Twitter LinkedIn Email

In the cybersecurity world, it comes as no surprise that connecting to unknown WiFi network can pose a threat to your device’s security. Yes, it is possible for threat actors (or amateurs, even) to spoof potentially free public WiFi SSIDs. When you are trying to survive a six hour layover and desperately wishing you could catch up with the top posts on Hacker News or the latest report from Brian Krebs, “Free Airport WiFi” is looking pretty darn irresistible. In the infosecurity space, connecting to these WiFi networks is as much of a faux pas as using a USB thumb drive without a thorough sweep of it’s potentially malicious files.

There is an area of WiFi SSID’s that I feel does not receive enough attention; creative and hilarious naming techniques. I fear this art form is always the bridesmaid, never the bride. To finally give creative naming the spotlight it so desperately deserves, I have spent the last few months collecting the top six SSIDs. I hope you enjoy!

VirusWormBot_v01: Although it lacks subtlety, if you are looking to send a quick, and hostile message this is always a great option:

FBI_Watch_Van3: For those who prefer a more understated approach to the SSID, I find this generates similar results, but also earns a laugh or two:

PRETTY FLY FOR A WI FI: An important category to successful SSID naming is the pun. Although fairly overdone, who can resist a reference to The Offspring?

Tell_My_WiFi_Loveher: This is a fresh take on the WiFi pun with some added charm:

Beer here + Where is the beer?: If you are looking for an interesting way to communicate with neighbors, I highly suggest this format:

It Hurts When IP: For my all time favorite (yet another pun). I feel this option needs no introduction.

Hopefully these WiFis gave you a nice chuckle over the short holiday week. Stay safe out there and be sure to connect to networks you trust!

Share this post and earn Cybytes
Facebook Twitter LinkedIn Email
About DomainTools
DomainTools helps security analysts turn threat data into threat intelligence. We take indicators from your network, including domains and IPs, and connect them with nearly every active domain on the Internet. Those connections inform risk assessments, help profile attackers, guide online fraud investigations, and map cyber activity to attacker infrastructure. Fortune 1000 companies, global government agencies, and leading security solution vendors use the DomainTools platform as a critical ingredient in their threat investigation and mitigation work. Learn more about how to connect the dots on malicious activity at
Promoted Content
The Distribution of Malicious Domains
In our previous reports, we profled malicious domains by describing patterns in theirregistration details: top level domain (TLD), free email provider, Whois privacy provider, andhosting location. In this edition, we compared the distributions of malicious domains vs neutraldomains across a measure of age (both of the domain and of the name server domain) anda measure of the entropy of the domain name. We also examined malicious domains acrossregistrars to fnd additional clues as to how and when these domains were registered.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?