17 October,2025 10:27 AM IST | Mumbai | Rumani Gabhare
Priyank Gada speaks at a cybersecurity event
When people imagine a hacker, they often picture someone in a black hoodie and a V for Vendetta mask - a mysterious figure who might call with a robotic voice or lock you out of your social media accounts, demanding ransom via an OTP, but hackers have evolved. They no longer hide behind clichés; instead, they conceal themselves in routers and the apps you trust.
An application reads the mood of a person by scanning the retina and facial features. PICS Courtesy/Priyank Gada
Today's attackers weaponise public Wi-Fi and hijack smart devices. Priyank Gada, a certified ethical hacker and digital forensics investigator, is hosting a practical workshop titled, Hacking Wi-Fi Networks: On-the-Go Practical Approaches. When asked about the biggest everyday Wi-Fi risk people still struggle with, Gada explains that people rely heavily on Wi-Fi instead of wired networks, which exposes the SSID (Service Set Identifier - the technical name for your Wi-Fi network that appears when you search for available networks). He suggests the SSID needs to be hidden because tech experts can easily access a visible network.
Gada also warns that public Wi-Fi requires more caution. "For example, in countries like the UAE, it's very simple: all one has to do is get a number, and you'll get Wi-Fi services anytime, anywhere. This is something India could work on, as it could be misused easily," he shares. The workshop will help participants understand the vulnerabilities that make Wi-Fi networks susceptible to attacks, including how attackers create fake access points to trick users, how de-authentication attacks can disconnect devices from a network, and how Packet Sniffing (the process of interpreting and analysing data packets as they travel across a network) lets attackers see and analyse data transmitted over unencrypted networks, along with defensive strategies and countermeasures.
The fictional character V, from the film V for Vendetta, is commonly used as a symbol by hackers online. PIC Courtesy/Wikimedia Commons
As technology advances, so do hackers. With every improvement in digital infrastructure, new vulnerabilities emerge. Modern attackers adapt quickly, leveraging artificial intelligence and social engineering; what once required hours of manual coding, as depicted in films, can now be done in minutes. Gada also stressed that gadgets, including cars and lockers, can be accessed through sophisticated apps and code. He adds, "When it comes to ethical misuse, a person who is trying to learn will never misuse it, as access to these things is usually a click away on apps like YouTube. Cybersecurity in India needs to be deeply explored. The main motive for me to hold this workshop is to make people realise that we aren't secure, and India as a nation should progress and put more effort into research and development.
ON October 17 and 24; 12 pm
Log on to in.bookmyshow.com
Cost Rs 20