The new forums will be named Coin Return (based on the most recent vote)! You can check on the status and timeline of the transition to the new forums here.
The Guiding Principles and New Rules document is now in effect.
Read the manual, my friend! You should be able to connect to your router and change settings and see who is connected. If you lost your manual, google your router and you can probably figure it out.
Try entering this into your browser address field: http://192.168.1.1/ If you get anything, it's your router. If you haven't changed the settings, try logging in leaving the user name and password blank, or using "admin" for the user field. Don't change any settings until you figure out how to reset your router to factory settings.
I don't know of anything like that. That security on your router is there for a reason. Why do you want to do this? If you think someone is connecting without authorization, you can add encryption, only allow a certain number of connections, or only allow computers with certain MAC addresses, ie yours.
I don't know of anything like that. That security on your router is there for a reason. Why do you want to do this? If you think someone is connecting without authorization, you can add encryption, only allow a certain number of connections, or only allow computers with certain MAC addresses, ie yours.
Yes I also use an Access list on my airport extreme. Very handy as I generally dont trust the security of WEP keys. If you want on, you have to go through me.
I have wpa psk security and my network name is not boadcast, but i think someone is connecting because once when all my computers were off i saw the internet lights on my modem and router still blinking which does not usually happen. how do you see your computer's mac address?
I'm sure there's some other way to do it, but you can log into your router, each computer one at a time and it will tell you the MAC address of who is connected. Add that to the accepted addresses, and limit the number of connections to the number of computers you have.
Theres only so much you can do. WPA you only need a few data packets to crack but once you have them you can go away and brute force the key. Mac filtering you'll crack without realizing it, its one line thats part of the packet monitoring in linux, and not broadcasting your SSID only stops windows/mac boxes. Linus just shows the mac of the broadcasted connection, and under SSID it shows not broadcasted. Realistically the only thing you can do is change your key about once a week, which will just make it too annoying to crack with WPA so someone moves onto a different router.
If you're worried about quick in-and-out access, perhaps which only occurs when you aren't at home, consider getting software like WireShark and leaving it running, logging traffic from your wireless adapter. It will capture a HUGE amount of traffic, but you can get reports which detail which machines (via MAC address, IP, etc.) are using your network.
mspencer on
MEMBER OF THE PARANOIA GM GUILD
XBL Michael Spencer || Wii 6007 6812 1605 7315 || PSN MichaelSpencerJr || Steam Michael_Spencer || Ham NOØK QRZ || My last known GPS coordinates: FindU or APRS.fi (Car antenna feed line busted -- no ham radio for me X__X )
Theres only so much you can do. WPA you only need a few data packets to crack but once you have them you can go away and brute force the key. Mac filtering you'll crack without realizing it, its one line thats part of the packet monitoring in linux, and not broadcasting your SSID only stops windows/mac boxes. Linus just shows the mac of the broadcasted connection, and under SSID it shows not broadcasted. Realistically the only thing you can do is change your key about once a week, which will just make it too annoying to crack with WPA so someone moves onto a different router.
you're thinking of WEP not WPA for being able to brute force the key with a few amount of packets.
Actually I'm not. WEP you monitor packets and then continue getting more and more packets while using the beacons to decrypt the WEP key. WPA you get a few packets and then use a dictionary file to brute force them. The difference being WEP decryption takes minutes but you must monitor the connection the entire time, where as WPA takes days but you only need to monitor it a few moments. Considering I'm using my neighbors wireless 128 bit WEP encrypted router to get online at the moment I think I know the difference.
From what I've read, you can only crack WPA in the very narrow case that uses pre-shared keys and short dictionary words. Even with a max length random word, it is going to take much longer than a few weeks to crack.
Ignore all the MAC address stuff as it easy to change a computers MAC address to whatever you want. Then to get around the issue DeShadowC is talking about make the WPA password at least 20 characters that are truly random. While this doesn't completely protect you its unlikely that a truly random 20 character string is will be in the dictionary the attacker is using and it will take way to long to actually brute force it.
From what I've read, you can only crack WPA in the very narrow case that uses pre-shared keys and short dictionary words. Even with a max length random word, it is going to take much longer than a few weeks to crack.
It takes under a week to brute force a WPA encryption. WPA 2 takes longer though.
Yeah, it's true that a lot of this stuff is crackable, but it's likely that whoever may be using his router knows jack shit about that stuff. Hell, just a few weeks ago I discovered my parents had accidentally been using their neighbor's wifi instead of their own for two years. I think it's much more likely that he lives near someone who knows a small amount about computers, rather than someone running Linux and trying to brute force his password.
Actually I'm not. WEP you monitor packets and then continue getting more and more packets while using the beacons to decrypt the WEP key. WPA you get a few packets and then use a dictionary file to brute force them. The difference being WEP decryption takes minutes but you must monitor the connection the entire time, where as WPA takes days but you only need to monitor it a few moments. Considering I'm using my neighbors wireless 128 bit WEP encrypted router to get online at the moment I think I know the difference.
From what I've read, you can only crack WPA in the very narrow case that uses pre-shared keys and short dictionary words. Even with a max length random word, it is going to take much longer than a few weeks to crack.
It takes under a week to brute force a WPA encryption. WPA 2 takes longer though.
If you want, I'll give you a few packets scanned from my wireless network, and you can see if you can crack the password that I use for my WPA-PSK in a few days if you're so confident. Oh, btw, it's 14 character alphanumeric string with upper and lower case plus special characters.
Actually I'm not. WEP you monitor packets and then continue getting more and more packets while using the beacons to decrypt the WEP key. WPA you get a few packets and then use a dictionary file to brute force them. The difference being WEP decryption takes minutes but you must monitor the connection the entire time, where as WPA takes days but you only need to monitor it a few moments. Considering I'm using my neighbors wireless 128 bit WEP encrypted router to get online at the moment I think I know the difference.
From what I've read, you can only crack WPA in the very narrow case that uses pre-shared keys and short dictionary words. Even with a max length random word, it is going to take much longer than a few weeks to crack.
It takes under a week to brute force a WPA encryption. WPA 2 takes longer though.
If you want, I'll give you a few packets scanned from my wireless network, and you can see if you can crack the password that I use for my WPA-PSK in a few days if you're so confident. Oh, btw, it's 14 character alphanumeric string with upper and lower case plus special characters.
In all seriousness, an occasional blip of the internet light on your router is not an indication that it's being used by someone else. There are frequent packet exchanges that occur between you and your ISP, and if the router is set to keep the connection alive (as most do w/o even a setting for it), it'll send/receive a few things to keep it going.
embrik on
"Damn you and your Daily Doubles, you brigand!"
I don't believe it - I'm on my THIRD PS3, and my FIRST XBOX360. What the heck?
LOL. No, it's nothing like that. I'm more likely to use stuff that my baby girl burbles out during random vocal events. At least I can guarantee they're not in a dictionary....
I don't know of anything like that. That security on your router is there for a reason. Why do you want to do this? If you think someone is connecting without authorization, you can add encryption, only allow a certain number of connections, or only allow computers with certain MAC addresses, ie yours.
This doesn't really help as much as you might think; it's not hard for someone to snoop your mac address and then spoof it.
Posts
Try entering this into your browser address field: http://192.168.1.1/ If you get anything, it's your router. If you haven't changed the settings, try logging in leaving the user name and password blank, or using "admin" for the user field. Don't change any settings until you figure out how to reset your router to factory settings.
Yes I also use an Access list on my airport extreme. Very handy as I generally dont trust the security of WEP keys. If you want on, you have to go through me.
XBL Michael Spencer || Wii 6007 6812 1605 7315 || PSN MichaelSpencerJr || Steam Michael_Spencer || Ham NOØK
QRZ || My last known GPS coordinates: FindU or APRS.fi (Car antenna feed line busted -- no ham radio for me X__X )
you're thinking of WEP not WPA for being able to brute force the key with a few amount of packets.
Turp, I found who was on your router.
Carl Sagan
It takes under a week to brute force a WPA encryption. WPA 2 takes longer though.
If you want, I'll give you a few packets scanned from my wireless network, and you can see if you can crack the password that I use for my WPA-PSK in a few days if you're so confident. Oh, btw, it's 14 character alphanumeric string with upper and lower case plus special characters.
http://www.smallnetbuilder.com/content/view/30278/98/1/6/
C0D3tr@pru1esU ?
In all seriousness, an occasional blip of the internet light on your router is not an indication that it's being used by someone else. There are frequent packet exchanges that occur between you and your ISP, and if the router is set to keep the connection alive (as most do w/o even a setting for it), it'll send/receive a few things to keep it going.
I don't believe it - I'm on my THIRD PS3, and my FIRST XBOX360. What the heck?
LOL. No, it's nothing like that. I'm more likely to use stuff that my baby girl burbles out during random vocal events. At least I can guarantee they're not in a dictionary....