I'm on somebody's unsecured Wi-Fi

Page 3 - Seeking answers? Join the AnandTech community: where nearly half-a-million members share solutions and discuss the latest tech.

RichUK

Lifer
Feb 14, 2005
10,334
677
126
Originally posted by: MercenaryForHire
:sigh;

You know what? Forget it. WEP is perfectly secure. It's unhackable. No one will ever steal your internets.

/resumes leeching bandwidth from the greatest free ISP ever, "LINKSYS"

- M4H

QFT
 

JulesMaximus

No Lifer
Jul 3, 2003
74,472
867
126
Originally posted by: InlineFour
and printed "you're being watched" on their printer. are there any other neat things you can do remotely?

WEP/WPA, mac filter, etc. are all disabled. i'm surprised they changed the router's default password though. imagine all the things i can do if i had access to their router. :evil:

the funny thing is that i'm using my WRT54G with DD-WRT firmware that's placed next to a door. so if they were suspicious enough, they could look outside and see a tin foil wrapped router.

Hehehe, I've done that before. There are a couple unsecured wireless connections near me, I've even logged into their router because they were too stupid to change the default password. :laugh: I didn't change any of their settings though.
 
Jan 31, 2002
40,819
2
0
Originally posted by: MangoTBG
But how do you figure what MAC address to spoof?

Sniff the traffic, grab a MAC address out of the air.

Originally posted by: Maximus96
then what to do for the most security possible?

Most security possible, or most security "practical"?

Use WPA-PSK, get a good random passphrase/password (Assortment of your favourite foods/people/places, interspliced with upper & lowercase, numbers, and special characters) and that's all you need for the time being.

Eg: "SecretPassword" is a bad passphrase. "M4Hist3huB@rl33t$@u$3&PwNzn00bZl1k3RichUK!" is a good one.

If you want to get a little more hardcore, you can enable WPA with a RADIUS server (assuming your router supports it.)

- M4H
 

InlineFive

Diamond Member
Sep 20, 2003
9,599
2
0
Originally posted by: JulesMaximus
Originally posted by: InlineFour
and printed "you're being watched" on their printer. are there any other neat things you can do remotely?

WEP/WPA, mac filter, etc. are all disabled. i'm surprised they changed the router's default password though. imagine all the things i can do if i had access to their router. :evil:

the funny thing is that i'm using my WRT54G with DD-WRT firmware that's placed next to a door. so if they were suspicious enough, they could look outside and see a tin foil wrapped router.

Hehehe, I've done that before. There are a couple unsecured wireless connections near me, I've even logged into their router because they were too stupid to change the default password. :laugh: I didn't change any of their settings though.

I would have set a key on their connection, and then printed out something on their printer telling them why I did it and how they could configure their computer to match the key.
 

tfinch2

Lifer
Feb 3, 2004
22,114
1
0
Originally posted by: MercenaryForHire
Originally posted by: MangoTBG
But how do you figure what MAC address to spoof?

Sniff the traffic, grab a MAC address out of the air.

Originally posted by: Maximus96
then what to do for the most security possible?

Most security possible, or most security "practical"?

Use WPA-PSK, get a good random passphrase/password (Assortment of your favourite foods/people/places, interspliced with upper & lowercase, numbers, and special characters) and that's all you need for the time being.

Eg: "SecretPassword" is a bad passphrase. "M4Hist3huB@rl33t$@u$3&PwNzn00bZl1k3RichUK!" is a good one.

If you want to get a little more hardcore, you can enable WPA with a RADIUS server (assuming your router supports it.)

- M4H

Also, one often overlooked item is disable broadcasting your SSID
 

RichUK

Lifer
Feb 14, 2005
10,334
677
126
Originally posted by: MercenaryForHire
Originally posted by: MangoTBG
But how do you figure what MAC address to spoof?

Sniff the traffic, grab a MAC address out of the air.

Originally posted by: Maximus96
then what to do for the most security possible?

Most security possible, or most security "practical"?

Use WPA-PSK, get a good random passphrase/password (Assortment of your favourite foods/people/places, interspliced with upper & lowercase, numbers, and special characters) and that's all you need for the time being.

Eg: "SecretPassword" is a bad passphrase. "M4Hist3huB@rl33t$@u$3&PwNzn00bZl1k3RichUK!" is a good one.

If you want to get a little more hardcore, you can enable WPA with a RADIUS server (assuming your router supports it.)

- M4H

ROFL :laugh:

I take it by PSK you mean the algorithm that is used, mine only has TKIP and AES. Ohh well.

Im getting scared i think M4H might Hax0R my router
 

InlineFour

Banned
Nov 1, 2005
3,194
0
0
Originally posted by: tfinch2
Originally posted by: MercenaryForHire
Originally posted by: MangoTBG
But how do you figure what MAC address to spoof?

Sniff the traffic, grab a MAC address out of the air.

Originally posted by: Maximus96
then what to do for the most security possible?

Most security possible, or most security "practical"?

Use WPA-PSK, get a good random passphrase/password (Assortment of your favourite foods/people/places, interspliced with upper & lowercase, numbers, and special characters) and that's all you need for the time being.

Eg: "SecretPassword" is a bad passphrase. "M4Hist3huB@rl33t$@u$3&PwNzn00bZl1k3RichUK!" is a good one.

If you want to get a little more hardcore, you can enable WPA with a RADIUS server (assuming your router supports it.)

- M4H

Also, one often overlooked item is disable broadcasting your SSID

disabling broadcasting of SSID will still be detectable under most war driving programs.

enabling WPA will be the safest without having to deal with more complicated security measures like a RADIUS server.

i suggest one of these randomly generated passphrases.

https://www.grc.com/passwords.htm
 

tfinch2

Lifer
Feb 3, 2004
22,114
1
0
Originally posted by: InlineFour
Originally posted by: tfinch2
Originally posted by: MercenaryForHire
Originally posted by: MangoTBG
But how do you figure what MAC address to spoof?

Sniff the traffic, grab a MAC address out of the air.

Originally posted by: Maximus96
then what to do for the most security possible?

Most security possible, or most security "practical"?

Use WPA-PSK, get a good random passphrase/password (Assortment of your favourite foods/people/places, interspliced with upper & lowercase, numbers, and special characters) and that's all you need for the time being.

Eg: "SecretPassword" is a bad passphrase. "M4Hist3huB@rl33t$@u$3&PwNzn00bZl1k3RichUK!" is a good one.

If you want to get a little more hardcore, you can enable WPA with a RADIUS server (assuming your router supports it.)

- M4H

Also, one often overlooked item is disable broadcasting your SSID

disabling broadcasting of SSID will still be detectable under most war driving programs.

enabling WPA will be the safest without having to deal with more complicated security measures like a RADIUS server.

i suggest one of these randomly generated passphrases.

https://www.grc.com/passwords.htm">https://www.grc.com/passwords.htm</a>

MAC filtering + disabled SSID + WPA + good passphrase is pretty damn good protection though if you ask me. It's all about layers.
 

engineereeyore

Platinum Member
Jul 23, 2005
2,070
0
0
Yeah, it's always fun to check the dhcp tables and see what their mac addresses are and then filter them out of their own router. I do that, but then I usually walk over to their house or print them a message through their printer. Something to let them know they need to makes some changes. I don't really think it's fair to pick on people who haven't had years of computer experience and are just trying to do their best, so I always feel guilty.
 
Jan 31, 2002
40,819
2
0
Originally posted by: tfinch2
MAC filtering + disabled SSID + WPA + good passphrase is pretty damn good protection though if you ask me. It's all about layers.

Yep. It's called "Onion Security" because it makes everyone who tries to use it cry.

MAC filtering + SSID broadcast disable are much more of an inconvenience, especially if you have new hardware coming in and out all the time. With either a strong WPA passphrase, or a RADIUS server, it's really not necessary.

- M4H
 
Jan 31, 2002
40,819
2
0
Originally posted by: RichUK
ROFL :laugh:

I take it by PSK you mean the algorithm that is used, mine only has TKIP and AES. Ohh well.

Im getting scared i think M4H might Hax0R my router

PSK = "Pre Shared Key" ... also called "WPA Personal" or on many home routers it's just called "WPA" and left at that. You have a WRT54, so you should have options for both WPA-PSK and WPA+RADIUS.

- M4H
 

GiLtY

Golden Member
Sep 10, 2000
1,487
1
0
Originally posted by: RichUK
Originally posted by: DannyLove
i'm curious, i have a wireless router in my house and I sometimes wonder if its 'secure.' What deems it unsecure? I have a 15-key or so encryption on it, so you'll need the exact network key to get on it........... Is that secure enough?

yes, unsecured would be someone running a WI-Fi network without WEP enabled. So you're fine.

Welllll.... even if you have WEP enabled it is still susceptible to attack due to flaws in the WEP algorithm. I think there are two prominent WEP programs that can crack the password in ~20 minutes? WPA would be better if the choice is available. If not I would just change the password every 1~2 week.

--GiLtY
 

Sust

Senior member
Sep 1, 2001
600
0
71
The flaws section is interesting

In August 2001, Scott Fluhrer, Itzik Mantin, and Adi Shamir. published a cryptanalysis of WEP that exploits the way the RC4 cipher and IV is used in WEP, resulting in a passive attack that can recover the RC4 key after eavesdropping on the network (depending on the network traffic (the number of packets you can inspect) the length could be from 10 minutes to indefinitely (if there is no data being sent at all)). There are also ways to force the traffic onto the network which is rejected, but packets are sent and thus can also be inspected to find the key. The attack was soon implemented, and automated tools have since been released. It is possible to perform the attack with a personal computer, off-the-shelf hardware and freely-available software.

I wonder how far theyve gotten 5 years later.
I personally just run the MAC filter because im an awesomely naive student who trusts the world not to spy on his AT postings and lame bank account.
If you think about it: if the person knows enough about linux and wireless, they could not only beat my MAC filter by spoofing, but they could probably break through my WEP key after crunching in front of my house for an hour or so too.
Oh, this strange and paranoid world we live in.
 

yosuke188

Platinum Member
Apr 19, 2005
2,726
2
0
I run an unsecure wireless network at home. I think I'm safe considering that I have no neighbors.
 

sdifox

No Lifer
Sep 30, 2005
96,152
15,772
126
Originally posted by: yosuke188
I run an unsecure wireless network at home. I think I'm safe considering that I have no neighbors.


You on a ranch or something?
 

Fritzo

Lifer
Jan 3, 2001
41,892
2,135
126
We used to drive around and print pics of our asses on unsecured company networks

That being said, a lot of peope don't secure their networks because they want to share them. If it's a residence, don't be a jerk.

If it's a company though--- have at it
 

aloser

Senior member
Nov 20, 2004
511
1
81
I don't have to worry about my neighbors breaking in, considering I'm the only computer owner in the neighborhood.

My biggest peeve is the disabled WPA everytime the router is reset. Can the firmware be hacked to include a password automatically? (In other words, is there a way to automatically set the router PW everytime it gets reset since the adapters are already set with the password?)
 

DaVortex

Senior member
Mar 9, 2004
370
0
0
Whenever my home connection goes out I use my centrino laptop which I am able to connect to someones router since I live in a condo and there are numerous unsecured connections.

One of the connections is named "keisha" I was able to get into her cisco router by using admin/admin. There isnt really that much there that I want to mess around with.

Is there a way to see what kind of files she has (maybe nude pictures of herself)
 
sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |