Tilted Forum Project Discussion Community  

Go Back   Tilted Forum Project Discussion Community > Interests > Tilted Technology


 
 
LinkBack Thread Tools
Old 05-02-2004, 02:59 PM   #1 (permalink)
At The Globe Showing Will How Its Done
 
MahlerIsGod's Avatar
 
Location: London/Elysium
Reverse Wardriving?????

Greetings Everyone,
The entire weekend my cable speeds have been less than a 56k modem. I am going to wait for the weekend to finally conclude (maybe Comcast is conducting some maintenance or upgrades?) to really start getting upset but this episode got me think. Could someone be siphoning off my wireless connection? I know there are programs that let people know there are open access points in the area but is there something out there to let me know if someone is tapping into my connection. Thanks
__________________
"But a work of art is a conscious human effort that has to do with communication. It is that or its nothing. When an accident is applauded as a work of art, when a cult grows up around the deliciousness of inadvertent beauty, we are in the presence of the greatest decadence the West has known in its history."
MahlerIsGod is offline  
Old 05-02-2004, 03:17 PM   #2 (permalink)
I flopped the nutz...
 
mikec's Avatar
 
Location: Stratford, CT
not sure of a program that can do it, but take a look in your router's settings for dhcp client table. you'd see that it distributed multiple IP addresses, which would indicate someone else is on your network.

I've had network slow down big time once or twice. Shut down, unplug your cable modem for a minute, plug it back in and let all lights come on and start your machine back up again. If that doesn't work, also try resetting the router as well, my linksys has needed that before.

and if you don't already have it in place, set up 128 bit WEP for your wireless connection, and make your password for it and the router tough. If you're in an area with a lot of people, change the channel you're on from 6 too. any changes on your router will also need to be made to the wireless computer you want to connect. that will help prevent anyone from leeching off your connection.
__________________
Until the 20th century, reality was everything humans could touch, smell, see, and hear. Since the initial publication of the charted electromagnetic spectrum, humans have learned that what they can touch, smell, see, and hear is less than one millionth of reality
mikec is offline  
Old 05-02-2004, 03:52 PM   #3 (permalink)
beauty in the breakdown
 
Location: Chapel Hill, NC
I dont know of any programs out there that would tell you if someone is using the access point, but if you just make sure that none of your machines are and it is still sending out lots of data, there is a good chance someone is.

Enable WEP encryption, and if possible MAC address filtering. Especially the last one. That will stop anyone other than you from using it.
__________________
"Good people do not need laws to tell them to act responsibly, while bad people will find a way around the laws."
--Plato
sailor is offline  
Old 05-02-2004, 04:31 PM   #4 (permalink)
Junkie
 
It's extremely easy to ascertain is someone is using your Access Point.

Just check the association table. If any clients you don't recognize are "associated", then they are POSSIBLY using your wireless.

There are a number of steps you should undertake to secure a home WLAN anyway.

1) Change the default SSID
All Access Points come with a default SSID (think of it as a "name") out of the box. The SSID is used to identify the 'cell'. This default SSID should be changed. Use something that is relevant to you. This is NOT really adding any security, but is simply best practice.

2) - Disable SSID Broadcast
By default, your AP will probably "broadcast" the SSID. Effectively it is saying "Look everyone! Here I am! Come and connect to me!". This is fine for public hotspots etc, but you don't really want or need it for home deployments. Simply disable SSID broadcast if possible (some models may not support this). Again, this does not really improve security, but is considered best practice.

3) Enable WPA (or WEP in "worst case" scenario)
If your Access Point supports WPA (WiFi Protected Access), then you should definitely enable it. For home use, this will be in what is known as "WPA-PSK Mode". The PSK stands for Pre-Shared Key. This means you will need to define a phrase or "key" to be entered on both the Access Point and your clients. This is then used (in the background, so you don't hvae to worry about it) to automatically generate new WEP keys every so often.

When choosing a pre-shared key (sometimes known as a phrase, or pass-phrase, or key), the longer the better. Ideally you should use something at least 20 characters long and that mixes upper case, lower case and numeric characters. Something like "Idon7WnthacK3rz!" (I don't want hackers). This is JUST AN EXAMPLE, but you get the idea.

If your Access Point does NOT support WPA (an old model for example), then configure 128bit WEP on both your AP and client and change it regularly. This may be a pain, but it's worth the extra security.

4) Enable MAC address filters
If you Access Point supports it, enable MAC Address filtering. You will need to know the MAC address of your own computers and input them into a table on the Access Point. Effectively you are telling your Access Point to "only allow these devices" to associate.

5) If possible bring down transmit power
There's no reason to be blasting out your signal at 100mW if you don't need to. Why extend your radio cell into the neighbourhood if you only want to cover your living room? This may require a little experimentation, but it's worth it.

6) - Lock data rate
This may not be suitable, but many users lock their data rate at 11Mbs (for 802.11b) or 54Mbs (for 802.11a/g). This means you either connect at that high speed, but nothing lower. This means that the area covered by the cell is smaller and "tighter". Alternatively, step it down one level.

The more data rates you support (or "allow"), the "bigger" your cell and the more likely that devices far away can associate; ie, hackers across the road.




Once you follow all (or most) of the steps above you shall mitigate 99.99% of most hacking attacks; these tend to be opportunistic in any case.


Any more questions on WLANs or security related topics, let me know...


Mr Mephisto
Mephisto2 is offline  
Old 05-02-2004, 04:46 PM   #5 (permalink)
Thats MR. Muffin Face now
 
losthellhound's Avatar
 
Location: Everywhere work sends me
if the above doesnt help, can you provide more info on your setup? (including equipment models)..
__________________
"Life is possible only with illusions. And so, the question for the science of mental health must become an absolutely new and revolutionary one, yet one that reflects the essence of the human condition: On what level of illusion does one live?"
-- Ernest Becker, The Denial of Death
losthellhound is offline  
Old 05-02-2004, 08:48 PM   #6 (permalink)
Addict
 
Excellent advice Mr Mephisto. Kudos.
yakimushi is offline  
Old 05-02-2004, 08:57 PM   #7 (permalink)
At The Globe Showing Will How Its Done
 
MahlerIsGod's Avatar
 
Location: London/Elysium
I must ditto the excellent advice commented on above by yakimushi. Thanks Mephisto. I am looking into each of those points as we speak. Thanks
__________________
"But a work of art is a conscious human effort that has to do with communication. It is that or its nothing. When an accident is applauded as a work of art, when a cult grows up around the deliciousness of inadvertent beauty, we are in the presence of the greatest decadence the West has known in its history."
MahlerIsGod is offline  
Old 05-02-2004, 10:04 PM   #8 (permalink)
Insane
 
How do u bring down your transmit power? I got a dlink and as soon as I saw that I looked in my options for my router and didnt find that, does that require tinkering with the innards of it?
roadkill is offline  
Old 05-02-2004, 10:50 PM   #9 (permalink)
Junkie
 
Absolutely not roadkill. What ever you do, don't go tinkering with your innards!

However, as I mentioned above, you should try to do this "if possible". I say it like that because not all makes and models may let you do this. I have no experience with the D-Link devices.

I know it's certainly possible with Cisco gear.

But if you only follow the first 4 steps, you'll be infinitely more secure that if you simply use the AP "out of the box".


Mr Mephisto
Mephisto2 is offline  
Old 05-02-2004, 11:52 PM   #10 (permalink)
mciprepaid
Guest
 
Mr. Mephisto's advice is very good but if you really want to know if anyone is associating with your AP that isnt you try using kiwi syslog from www.kiwisyslog.com. It will make a log whenever a client tries to associate with your AP. I have a cisco wireless class and we used this on a Aironet 1100AP.
 
Old 05-03-2004, 01:09 AM   #11 (permalink)
Junkie
 
Logging onto your AP and asking it to display the association table is the best way of ascertaining the clients that have associated to it.

Trust me on this mciprepaid.

All the kiwisyslog util does is query a host on its SNMP and log files. Not all entry level kit supports out of band management.

Mr Mephisto
Mephisto2 is offline  
 

Tags
reverse, wardriving


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On



All times are GMT -8. The time now is 02:59 AM.

Tilted Forum Project

Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2024, vBulletin Solutions, Inc.
Search Engine Optimization by vBSEO 3.6.0 PL2
© 2002-2012 Tilted Forum Project

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360