FYI logo

The Night I Stayed Awake to Catch a Hacker

How One Long Night Opened My Eyes to the Hidden Threats in My Own Network

By Azmat Writes TechPublished 7 months ago 3 min read

It was just a regular evening. I had finished dinner, closed my work laptop, and was about to relax. But then something caught my attention.

My internet was acting strange.

Web pages were slow to load, my YouTube videos kept buffering, and even my smart home lights were responding late. At first, I thought the internet service was just bad that night.

But deep inside, something didn’t feel right. Being someone who’s studying cybersecurity and ethical hacking, I’ve learned to trust my gut.

So I made a decision.

I would stay up that night and find out what was really happening on my network.

Something Felt Off

Around 11 PM, I grabbed my personal laptop, opened Kali Linux, and got to work. I turned on monitor mode on my wireless adapter. This let me scan every device connected to my Wi-Fi—even the hidden ones.

Then I launched Wireshark, a tool I often use to see what kind of data is flowing through the network. Think of it like watching invisible traffic move across invisible roads.

At first, it all looked fine. My phone was there. My wife’s phone. Our smart TV. My work laptop.

But then I noticed a device I didn’t recognize.

No name. No company details. Just a strange MAC address.

It was quietly sending and receiving packets of data.

Digging Deeper

I copied the MAC address and ran it through an online lookup tool to see who made the device.

No result.

That was my first red flag. Most devices show at least the name of the manufacturer—like Apple, Samsung, or TP-Link.

But this? Nothing.

I decided to dig deeper. I opened a terminal and ran nmap, a tool that lets you scan devices on a network to see what ports are open and what services they’re running.

The results surprised me. The device was not just connected to my network—it was actively communicating with an outside IP address. Possibly sending or receiving data from a remote server.

Was someone inside my network?

A Bold Move

Around 1:30 AM, I decided to take a bold step: I launched a deauthentication attack.

This type of attack doesn’t damage anything—it simply kicks devices off the network temporarily by sending them fake disconnect signals. It’s often used in penetration testing to capture handshake packets.

I aimed it at the unknown device.

Within seconds, it disappeared from the network.

No more data. No more signal. It was gone.

But where did it come from? Why was it there?

What I Found the Next Morning

After just three hours of sleep, I woke up and started checking the logs on my router. Hidden deep in the DHCP logs, I saw it: the unknown device had first connected around 3 AM two nights ago.

That meant someone had been quietly watching my network—for days.

The good news? No major damage was done. I quickly changed all passwords, updated my router firmware, and blocked unknown MAC addresses. I even enabled network-level encryption and turned off remote access settings.

The Lesson I Learned

This experience changed the way I look at the internet. Most people think hackers only target big companies. But that’s not true.

Sometimes, they go after easy targets—like people with weak Wi-Fi passwords or outdated routers. You don’t have to be rich or famous to become a victim.

That night, I didn’t just catch a hacker.

I caught a glimpse of the silent war happening all around us—between those who build the internet, and those who try to break it.

What You Can Do to Stay Safe

If you’re reading this and wondering, “Could this happen to me?”, the answer is yes. But don’t panic. Here are some simple things you can do:

Use a strong Wi-Fi password (no names, dates, or easy words)

Change your router login (many people leave it as “admin / admin”)

Keep your router firmware updated

Disable WPS (it’s a known weakness in many routers)

Check your connected devices list regularly

Final Thoughts

I’m glad I stayed awake that night. What started as a small lag in internet speed turned into a real-life hacking story I’ll never forget.

Cybersecurity isn’t just for IT professionals or big companies—it’s for all of us.

The digital world is growing, and with it, so are the threats. But with awareness, the right tools, and a little curiosity, anyone can protect themselves.

Even someone sitting in a dark room at 2 AM, watching the internet breathe.

ScienceHistorical

About the Creator

Azmat Writes Tech

Tech enthusiast with a passion for cybersecurity, ethical hacking, and digital forensics. I simplify complex topics, share real-world insights, and help readers explore the hidden side of technology. Welcome to AzmatWritesTech.

Reader insights

Be the first to share your insights about this piece.

How does it work?

Add your insights

Comments

There are no comments for this story

Be the first to respond and start the conversation.

Sign in to comment

    Find us on social media

    Miscellaneous links

    • Explore
    • Contact
    • Privacy Policy
    • Terms of Use
    • Support

    © 2026 Creatd, Inc. All Rights Reserved.