The new forums will be named Coin Return (based on the most recent vote)! You can check on the status and timeline of the transition to the new forums here.
The Guiding Principles and New Rules document is now in effect.

Need WiFi Router Monitoring Software

turpentyineturpentyine Registered User regular
edited August 2008 in Help / Advice Forum
I want to be able to see who connects to my Netgear wireless router. Is there such software?
Thank you.

turpentyine on

Posts

  • Drew_9999Drew_9999 Registered User regular
    edited August 2008
    Read the manual, my friend! You should be able to connect to your router and change settings and see who is connected. If you lost your manual, google your router and you can probably figure it out.

    Try entering this into your browser address field: http://192.168.1.1/ If you get anything, it's your router. If you haven't changed the settings, try logging in leaving the user name and password blank, or using "admin" for the user field. Don't change any settings until you figure out how to reset your router to factory settings.

    Drew_9999 on
  • turpentyineturpentyine Registered User regular
    edited August 2008
    I wanna be able to see without constantly logging into to the router. Just software I can run on any of my computers and see the connection.

    turpentyine on
  • Drew_9999Drew_9999 Registered User regular
    edited August 2008
    I don't know of anything like that. That security on your router is there for a reason. Why do you want to do this? If you think someone is connecting without authorization, you can add encryption, only allow a certain number of connections, or only allow computers with certain MAC addresses, ie yours.

    Drew_9999 on
  • Durandal InfinityDurandal Infinity Registered User regular
    edited August 2008
    Drew_9999 wrote: »
    I don't know of anything like that. That security on your router is there for a reason. Why do you want to do this? If you think someone is connecting without authorization, you can add encryption, only allow a certain number of connections, or only allow computers with certain MAC addresses, ie yours.

    Yes I also use an Access list on my airport extreme. Very handy as I generally dont trust the security of WEP keys. If you want on, you have to go through me.

    Durandal Infinity on
  • turpentyineturpentyine Registered User regular
    edited August 2008
    I have wpa psk security and my network name is not boadcast, but i think someone is connecting because once when all my computers were off i saw the internet lights on my modem and router still blinking which does not usually happen. how do you see your computer's mac address?

    turpentyine on
  • Drew_9999Drew_9999 Registered User regular
    edited August 2008
    I'm sure there's some other way to do it, but you can log into your router, each computer one at a time and it will tell you the MAC address of who is connected. Add that to the accepted addresses, and limit the number of connections to the number of computers you have.

    Drew_9999 on
  • turpentyineturpentyine Registered User regular
    edited August 2008
    thnx just did the mac address thing

    turpentyine on
  • DeShadowCDeShadowC Registered User regular
    edited August 2008
    Theres only so much you can do. WPA you only need a few data packets to crack but once you have them you can go away and brute force the key. Mac filtering you'll crack without realizing it, its one line thats part of the packet monitoring in linux, and not broadcasting your SSID only stops windows/mac boxes. Linus just shows the mac of the broadcasted connection, and under SSID it shows not broadcasted. Realistically the only thing you can do is change your key about once a week, which will just make it too annoying to crack with WPA so someone moves onto a different router.

    DeShadowC on
  • mspencermspencer PAX [ENFORCER] Council Bluffs, IARegistered User regular
    edited August 2008
    If you're worried about quick in-and-out access, perhaps which only occurs when you aren't at home, consider getting software like WireShark and leaving it running, logging traffic from your wireless adapter. It will capture a HUGE amount of traffic, but you can get reports which detail which machines (via MAC address, IP, etc.) are using your network.

    mspencer on
    MEMBER OF THE PARANOIA GM GUILD
    XBL Michael Spencer || Wii 6007 6812 1605 7315 || PSN MichaelSpencerJr || Steam Michael_Spencer || Ham NOØK
    QRZ || My last known GPS coordinates: FindU or APRS.fi (Car antenna feed line busted -- no ham radio for me X__X )
  • cSpoogecSpooge Registered User regular
    edited August 2008
    DeShadowC wrote: »
    Theres only so much you can do. WPA you only need a few data packets to crack but once you have them you can go away and brute force the key. Mac filtering you'll crack without realizing it, its one line thats part of the packet monitoring in linux, and not broadcasting your SSID only stops windows/mac boxes. Linus just shows the mac of the broadcasted connection, and under SSID it shows not broadcasted. Realistically the only thing you can do is change your key about once a week, which will just make it too annoying to crack with WPA so someone moves onto a different router.

    you're thinking of WEP not WPA for being able to brute force the key with a few amount of packets.

    cSpooge on
  • DeShadowCDeShadowC Registered User regular
    edited August 2008
    Actually I'm not. WEP you monitor packets and then continue getting more and more packets while using the beacons to decrypt the WEP key. WPA you get a few packets and then use a dictionary file to brute force them. The difference being WEP decryption takes minutes but you must monitor the connection the entire time, where as WPA takes days but you only need to monitor it a few moments. Considering I'm using my neighbors wireless 128 bit WEP encrypted router to get online at the moment I think I know the difference. :)

    DeShadowC on
  • dlpwillywonkadlpwillywonka Registered User regular
    edited August 2008
    DeShadowC wrote: »
    Considering I'm using my neighbors wireless 128 bit WEP encrypted router to get online at the moment I think I know the difference. :)

    Turp, I found who was on your router.

    dlpwillywonka on
    Somewhere, something incredible is waiting to be known.
    Carl Sagan
  • stigweardstigweard Registered User regular
    edited August 2008
    From what I've read, you can only crack WPA in the very narrow case that uses pre-shared keys and short dictionary words. Even with a max length random word, it is going to take much longer than a few weeks to crack.

    stigweard on
  • khainkhain Registered User regular
    edited August 2008
    Ignore all the MAC address stuff as it easy to change a computers MAC address to whatever you want. Then to get around the issue DeShadowC is talking about make the WPA password at least 20 characters that are truly random. While this doesn't completely protect you its unlikely that a truly random 20 character string is will be in the dictionary the attacker is using and it will take way to long to actually brute force it.

    khain on
  • DeShadowCDeShadowC Registered User regular
    edited August 2008
    stigweard wrote: »
    From what I've read, you can only crack WPA in the very narrow case that uses pre-shared keys and short dictionary words. Even with a max length random word, it is going to take much longer than a few weeks to crack.

    It takes under a week to brute force a WPA encryption. WPA 2 takes longer though.

    DeShadowC on
  • Drew_9999Drew_9999 Registered User regular
    edited August 2008
    Yeah, it's true that a lot of this stuff is crackable, but it's likely that whoever may be using his router knows jack shit about that stuff. Hell, just a few weeks ago I discovered my parents had accidentally been using their neighbor's wifi instead of their own for two years. I think it's much more likely that he lives near someone who knows a small amount about computers, rather than someone running Linux and trying to brute force his password.

    Drew_9999 on
  • codetrapcodetrap Registered User regular
    edited August 2008
    DeShadowC wrote: »
    Actually I'm not. WEP you monitor packets and then continue getting more and more packets while using the beacons to decrypt the WEP key. WPA you get a few packets and then use a dictionary file to brute force them. The difference being WEP decryption takes minutes but you must monitor the connection the entire time, where as WPA takes days but you only need to monitor it a few moments. Considering I'm using my neighbors wireless 128 bit WEP encrypted router to get online at the moment I think I know the difference. :)
    DeShadowC wrote: »
    stigweard wrote: »
    From what I've read, you can only crack WPA in the very narrow case that uses pre-shared keys and short dictionary words. Even with a max length random word, it is going to take much longer than a few weeks to crack.

    It takes under a week to brute force a WPA encryption. WPA 2 takes longer though.

    If you want, I'll give you a few packets scanned from my wireless network, and you can see if you can crack the password that I use for my WPA-PSK in a few days if you're so confident. Oh, btw, it's 14 character alphanumeric string with upper and lower case plus special characters.

    http://www.smallnetbuilder.com/content/view/30278/98/1/6/

    codetrap on
    < insert witty comment here>
  • embrikembrik Registered User regular
    edited August 2008
    codetrap wrote: »
    DeShadowC wrote: »
    Actually I'm not. WEP you monitor packets and then continue getting more and more packets while using the beacons to decrypt the WEP key. WPA you get a few packets and then use a dictionary file to brute force them. The difference being WEP decryption takes minutes but you must monitor the connection the entire time, where as WPA takes days but you only need to monitor it a few moments. Considering I'm using my neighbors wireless 128 bit WEP encrypted router to get online at the moment I think I know the difference. :)
    DeShadowC wrote: »
    stigweard wrote: »
    From what I've read, you can only crack WPA in the very narrow case that uses pre-shared keys and short dictionary words. Even with a max length random word, it is going to take much longer than a few weeks to crack.

    It takes under a week to brute force a WPA encryption. WPA 2 takes longer though.

    If you want, I'll give you a few packets scanned from my wireless network, and you can see if you can crack the password that I use for my WPA-PSK in a few days if you're so confident. Oh, btw, it's 14 character alphanumeric string with upper and lower case plus special characters.

    http://www.smallnetbuilder.com/content/view/30278/98/1/6/

    C0D3tr@pru1esU ?

    In all seriousness, an occasional blip of the internet light on your router is not an indication that it's being used by someone else. There are frequent packet exchanges that occur between you and your ISP, and if the router is set to keep the connection alive (as most do w/o even a setting for it), it'll send/receive a few things to keep it going.

    embrik on
    "Damn you and your Daily Doubles, you brigand!"

    I don't believe it - I'm on my THIRD PS3, and my FIRST XBOX360. What the heck?
  • codetrapcodetrap Registered User regular
    edited August 2008
    @ Embrik..


    LOL. No, it's nothing like that. I'm more likely to use stuff that my baby girl burbles out during random vocal events. At least I can guarantee they're not in a dictionary....

    :)

    codetrap on
    < insert witty comment here>
  • jayabalardjayabalard Registered User new member
    edited August 2008
    Drew_9999 wrote: »
    I don't know of anything like that. That security on your router is there for a reason. Why do you want to do this? If you think someone is connecting without authorization, you can add encryption, only allow a certain number of connections, or only allow computers with certain MAC addresses, ie yours.
    This doesn't really help as much as you might think; it's not hard for someone to snoop your mac address and then spoof it.

    jayabalard on
Sign In or Register to comment.