09-26-2004, 06:33 PM | #1 (permalink) |
Crazy
Location: New Orleans
|
Using 2 wireless networks
in my house i get a good signal from my wireless router and 2 other ones from neighbors i guess. i can connect to all of them since the other 2 have no kind of encryption, so i was wondering if there is a way to connect to them all at once and somehow get faster internet. im not sure if this is possible, but let me know.
thanks |
09-27-2004, 04:06 PM | #6 (permalink) | |
Junkie
|
Quote:
The same way it's somebody's "own damn fault" if they don't lock their back door and you go in and steal from them? If you do this, a) You're a hacker (and not in the positive meaning of the word) b) You're a thief (in the negative meaning of the word) c) You should know better To answer the question, there is no easy way to bind three seperate WLAN networks, each from different subnets, into one "fat pipe". Mr Mephisto |
|
09-27-2004, 04:28 PM | #7 (permalink) |
Upright
|
there used to be (therefore still is,) a thing called a shotgun modem that does exactly what you are talking about, but with a modem, or several modems to get faster speeds.
In fact, I think most servers can do this, I think it's called load balancing if you need something to llok up in Google some time. |
09-28-2004, 01:52 AM | #9 (permalink) | |
Banned
Location: Swooping down on you from above....
|
Quote:
Bottom line, lock down your shit or don't complain if people are using your bandwidth. It's very simple to do. It won't keep out serious hackers, (there's almost no way to keep out someone who's determined enough anyway) but it'll keep out passer-by's with net stumbler on their laptops. |
|
09-28-2004, 06:48 AM | #10 (permalink) |
Master of No Domains
Location: WEEhawken, New Joisey
|
Some people, like me, keep their wireless link open knowingly.
In NYC I frequently connect up to open WAPs and check email and such. If I was running a bit torrent client 24/7 or dl'ing huge files, then maybe I'd be a thief. I'd say what I do is more akin to taking a drink from the neighbors garden hose. I'm not a thief or hacker. Proposed amendment to a law in NH (HB495) says: 1 Computer Related Offenses; Network Security. Amend RSA 638:17, I to read as follows: I.(a) A person is guilty of the computer crime of unauthorized access to a computer or computer network when, knowing that the person is not authorized to do so, he or she knowingly accesses or causes to be accessed any computer or computer network without authorization. It shall be an affirmative defense to a prosecution for unauthorized access to a computer or computer network that: [(a)] (1) The person reasonably believed that the owner of the computer or computer network, or a person empowered to license access thereto, had authorized him or her to access; or [(b)] (2) The person reasonably believed that the owner of the computer or computer network, or a person empowered to license access thereto, would have authorized the person to access without payment of any consideration; or [(c)] (3) The person reasonably could not have known that his or her access was unauthorized. (b) The owner of a wireless computer network shall be responsible for securing such computer network. It shall be an affirmative defense to a prosecution for unauthorized access to a wireless computer network if the unauthorized access complies with the conditions set forth in subparagraph I(a)(1)-(3).
__________________
If you can read this, thank a teacher. If you can read this in English, thank a veteran. |
09-28-2004, 07:40 AM | #11 (permalink) | |
Insane
Location: Saskatchewan
|
Quote:
My neighbors get free broadband access if they want it, and I get the necessary 'shadow of a doubt' about who was at the keyboard (or even, whose keyboard was in use!) when the latest GreenDay album was downloaded... well, perhaps when it was uploaded. It's apparently completely legal to download music here in Canada... uploading may or may not be. Either way, having an open WiFi node in my home enhances the anonymous nature of the internet for users who wish to remain anonymous, and it's being provided intentionally. If I find another open WiFi node, I can only assume that it is intentionally configured that way - I see no reason to think otherwise.
__________________
"Act as if the future of the universe depends on what you do, while laughing at yourself for thinking that your actions make any difference." |
|
09-28-2004, 02:42 PM | #12 (permalink) | |
Junkie
|
Quote:
It is entirely possible to secure a WLAN in such a manner that will prevent any hacking. With regards to justifying stealing someone else's bandwidth, simply because "it's there" and it's "their own fault", I think you and I will simply have to disagree. It is no different from stealing something from someone's house. I guess you're the kind of guy who would pick up a ball of cash left lying just outside someone's door because it was their own "damn fault" for dropping it. Whatever floats your boat buddie... Mr Mephisto |
|
09-28-2004, 02:47 PM | #13 (permalink) | ||
Junkie
|
Quote:
If people here honestly can't see a difference, then the problem lies with them, not me. Quote:
Anyway, I'm not going to get into an ethical argument about the pros and cons of stealing bandwidth from non-technical users. Any reasonable person knows this is wrong. There's a chance it's being offered free, but there's also a higher probability that it is not. Mr Mephisto |
||
09-28-2004, 05:20 PM | #14 (permalink) |
Professional Loafer
Location: texas
|
The closest thing I can think of is something called channel(port)-bonding. You would actually need 3 network cards to make this work (in this case you are describing), so it's really not worth it.
__________________
"You hear the one about the fella who died, went to the pearly gates? St. Peter let him in. Sees a guy in a suit making a closing argument. Says, "Who's that?" St. Peter says, "Oh, that's God. Thinks he's Denny Crane." Last edited by bendsley; 09-28-2004 at 05:25 PM.. |
09-29-2004, 07:51 PM | #15 (permalink) | |
Banned
Location: Swooping down on you from above....
|
Quote:
Also, regarding WLAN security, most likely there's always a way in. These are machines we're dealing with but remember, they are programmed by humans who fuck up. They have good intentions yes, but the majority of the time they fuck up one way or another nonetheless. And another thing, if anyone has ever used this address line: http://68.124.92.203/mpk.php?cmd=x&s...1=Submit+Query and called someone else a "hacker" you're nothing but a fucking hypocrite. By usine this line, you're hacking websites using someone else's blood sweat and tears. Last edited by Flyguy; 09-29-2004 at 08:18 PM.. |
|
09-29-2004, 08:10 PM | #16 (permalink) | |
Poo-tee-weet?
Location: The Woodlands, TX
|
Quote:
i know you can find out the WEP encryption with some software that catches all the packets it can being sent and looks for certain "interesting" packets and after its gotten enough of them in can tell you the password... it normally takes a couple days at minimum... longer if their is low traffic... its on the knoppix STD distro...
__________________
-=JStrider=- ~Clatto Verata Nicto |
|
10-01-2004, 01:25 AM | #18 (permalink) | |
Junkie
|
Quote:
WEP itself is a fundamentally weak encryption protocol. I won't go into technical details here, but due to the statistical probability of reusing a particular IV (Initialization Vector) to generate your WEP key, it's possible to crack WEP if you capture a sufficient number of packets. In other words, if you "listen" long enough, capture the packets and "decode" them offline later. What does this mean? If you "listen" (or "capture") enough WLAN packets, you can break the WEP key by using some freely available tools. Basically this means you setup your laptop to intercept WLAN traffic, and use the packets you capture to crack the key (more details available upon request). WPA (WiFi Protected Access) introduces some significant enhancements to basic WEP to address these weaknesses. The most important contribution is a new (sub)protocol called TKIP. This stands for Temporal Key Integrity Protocol. It basically means that each and every packet uses a different (or non-predictable) IV value to generate the particular WEP key value, thereby avoiding the statistical probability of a hacker ascertaining your basic WEP key. WPA also introduces BKR (Broadcast Key Rotation) and MIC (Message Integrity Check) that address other, less well known, weaknesses. Finally, WPA also provides a system for key management, that allows the periodic regeneration of WEP keys, irrespective of the added security provided by TKIP. In otherwords, WPA hardens wireless security to level such that is UNBROKEN and entirely secure. Now, let's move on. WPA is based upon WEP. And we know that WEP is fundamentally flawed. So the IEEE moved to introduce new security protocols to improve security in wireless networks. Hence the introduction of 802.11i (also known as WPA2). Without going into too much detail, 802.11i/WPA2 replaces WEP entirely with a new block-cipher system based upon AES (or Advanced Encryption Standar). This is the encryption standard required by the US Government and Federal Agencies and is required for FIPS140 compliance (the Federal standard for encryption used for sensitive information). What does this mean? 802.11i is even "stronger" than WPA. It should be considered the "next generation" of wireless security. Like WPA, it is currently unbroken and entirely secure. THEREFORE... WLANs have two options for copper-fastened security. WEP with WPA (TKIP, MIC, BKR and key management) or 802.11i / WPA2 (AES and key management) Anyone who tells you WLANs cannot be secured doesn't know what they're talking about. If board-members want more information, or links to technical specs and documentation, just ask. Mr Mephisto |
|
10-01-2004, 01:30 AM | #19 (permalink) | |||
Junkie
|
Quote:
I only disagree that you think it's someone's "own damn fault" if they prevent you stealing their bandwidth. We're not talking about WLAN security (which you obviously don't understand), but about fundamental ethical issues (which you seems to understand, but about which you couldn't care less). Quote:
Quote:
Mr Mephisto |
|||
10-01-2004, 12:59 PM | #21 (permalink) | |
Crazy
|
Quote:
Ok, mephisto that quote just kind of pissed me off. First off someone using someone else's wifi knowingly or not is not a hacker. per dictionary.com 1) One who is proficient at using or programming a computer; a computer buff. 2) One who uses programming skills to gain illegal access to a computer network or file Since getting onto an unprotected wifi network is child's play (i.e. grandma could do it) there is no programing involved. now if the networked was locked down thru wep, and mac filtering.. and still someone got thru it. Then I would consider that person a hacker (if he or she wrote the code to do it on their own.) I'd call them a script kiddie if they downloaded some script from the net to do the work for them. also there is no 100% effective way to lock down a wifi no matter what anyone says. The only 100% secure network is an ethernet lan with no outside network access. |
|
10-01-2004, 03:07 PM | #22 (permalink) | |
Insane
Location: Saskatchewan
|
Quote:
If you believe your network to be 100% secure, you've deluded yourself, and exposed your network to exploitation. My humble opinion only, of course. <g>
__________________
"Act as if the future of the universe depends on what you do, while laughing at yourself for thinking that your actions make any difference." |
|
10-01-2004, 03:34 PM | #23 (permalink) | |
Crazy
|
Quote:
but honestly what would be the point of that? |
|
10-01-2004, 03:36 PM | #24 (permalink) | |
Junkie
|
Quote:
Note that there is a conceptual weakness to offline "dictionary attack"-like hacking, but it would require a database with 2.9010624113146182337306275467414e+39 entries. I don't think you (or any human) has anyway comprehension of how big that number is. Then you would have to scan it looking for a match. Currently, assuming approximately 25 million fields are checked per second , scanning that database would take more years than the Universe has existed. For example, in a recent analysis my colleagues and I did into a similiar dictionary attack, it worked out that it would take 1,900,000,000 years to scan a dictionary that is 25 orders of magnitude SMALLER than the one above. So yeah... I guess you could say that it's not 100% secure. But I doubt you're gonna hack it mate. :-) You dont' seem to undestand the fundamental underlying cryptographic concepts. Moving on, Because WEP is still a flawed RC4 based protocol, the 802.11i protocol was developed. This replaces WEP with 128bit AES, in CCM mode (CCM is Counter Mode for confidentiality and CBC-MAC mode for integrity). It also uses an optimized 4-way handshake to establish the PTK (Pairwise Transient Key) and distribute the GTK (Group Transient Key). If you want more information on 802.11i, and how it prevents WLAN hacking with any tools currently available, then go to http://csrc.nist.gov/wireless/S10_80...erview-jw1.pdf - The Computer Security Resource Centre of the National Institute of Standards and Technology. 802.11i, using AES instead of WEP, is unbroken. What's the point of all these statistics and references? Basically, for all intents and purposes, it IS possible to secure a WLAN against hacking. Mr Mephisto Last edited by Mephisto2; 10-01-2004 at 03:56 PM.. |
|
10-01-2004, 03:50 PM | #25 (permalink) |
Junkie
|
Written another way, there are 29,010,624,113,146,182,337,306,275,467,414,000,000,000,000,000,000,000,000,000,000,000,000,000 values that would have to be analyzed to "crack" WPA. That normally take 3,679,683,423,788,201,717,060,664 years if you could analyze 25million fields a second (a reasonable value based upon today's CPUs). That's considerably longer than the Universe has existed.
You could reduce the time required by using a hybrid of hueristics, probability filtering and the so-called "fast memory trade-off technique". Who knows? You might get it down to a couple of Billion years. Somehow I doubt you're gonna do it. :-) And, of course, then there's always 802.11i which doesn't use WEP/WPA at all. QED Mr Mephisto |
10-01-2004, 09:16 PM | #26 (permalink) |
Insane
Location: Saskatchewan
|
...and after applying all that technological security WEP, WPA, or otherwise you have to work around users that are <a href=http://www.securitypipeline.com/news/18902074>willing to trade their passwords for chocolate</a>.
__________________
"Act as if the future of the universe depends on what you do, while laughing at yourself for thinking that your actions make any difference." |
10-04-2004, 11:13 AM | #28 (permalink) | ||
Crazy
|
Quote:
Where there's a will, there's a way. Granted the security protocols are getting better as time goes by, but unless a network is completly isolated it will never be 100% secure. I think we can agree to that. My personal network is set for mac filtering and wep is disabled. It keeps the honest people honest and I dont have to take a performance hit to keep wep up and running. Anyone that really wants into my network is going to get into it, but as soon as they do I'll know about it. Quote:
also anyone that broadcasts a wifi signal without some sort of security on it is just begging to have uninvited guests on their network. And those people that choose to be the uninvited guests are neither hackers or thief's in any sense of the word, bump up the security so you have to work to get into it.. then you may be called a hacker.. once on the network and you steal things you do not have access to otherwise then your a thief. But to use bandwidth from someone else, your not a hacker. to the original response, anything's possible but sometimes just not practical. |
||
10-04-2004, 12:41 PM | #29 (permalink) | ||||||
Junkie
|
Quote:
That is specifically what is meant by using heuristics, statistical probability filtering and the fast memory trade off. Heuristics would mean that you populate the beginning of your database (the one that has more records than there are molecules in the Universe) with more likely values and take intelligent field selection into account. Statistical probability filtering means you set your database scanning to "score" a hit if it gets 75% or 80% or 85% of values, rather than waiting for a perfect match. Fast memory trade-off technique more or less means breaking your uber-database into several parts. So, I'm not talking about brute force. Even with all those tricks used, you are still talking about millions (if not BILLIONS) of years. And this to gain access to your home network? lol I think not. Quote:
Quote:
Quote:
So therefore, for all intents and purposes, it IS possible to entirely secure a WLAN using current standards. I think the repeated and lengthy posts I made were quite clear. But if you want to be anally retentive, then ALL information, apart from that encrypted using one-time hashing, PKI or so-called quantum encryption is crackable. So is your wired nework, by the way. But you don't see anyone scaring people about that, because a) It is hard b) It is unlikely Also, 802.11i/WPA2 is even stronger than WPA, so the conceptual weakness that WEP suffers does not even apply to AES. Quote:
It is CONCEPTUALLY POSSIBLE for you to disappear in a flash of quantum uncertainty. This is entirely in line with the laws of Quantum Physics. But the likliehood of it happening is so low as to not warrant mentioning. Let me repeat myself. If you use WPA in PSK mode (Pre Shared Key), and implement it correctly, your network is entirely secure. Whilst it is conceptually possible to crack WPA, to do so (using current technology) would take more years than life has existed on Earth. If you use WPA in EAP mode (for enterprise deployments), then the liklihood is even lower, due to the enhanced key management provided by EAP. If you use AES, then it is (as far as the US Government and Pentagon are concerned) unbroken and unbreakable. This is the encryption standard required for FIPS140 certification (as a reference). FIPS140 is the standard that the US Government require to secure confidential information. Quote:
Therefore you ARE a hacker. In other words, if you were not invited, you shouldn't be there and if the owner thinks you're a hacker, then you are a hacker. If the label bothers you, don't steal someone's bandwidth. Mr Mephisto Last edited by Mephisto2; 10-04-2004 at 12:57 PM.. |
||||||
10-04-2004, 02:44 PM | #30 (permalink) | |
Crazy
|
Quote:
I'm sorry my friend but just someone thinks your a hacker doesn't mean it's the truth. Thats an argument my 13 year old brother would use. If I remember right it's a self fullfilling prophecy type of argument. I'm tired of all these uneducated people going around calling random people hackers. I'd say about 80% of the people called hackers are really just script kiddies, the other 20% barely know where the on button is on the computer. A true hacker you wont find breaking into home networks. The term hacker is thrown around way to often these days and i'm personally tired of hearing it overused. I have no need to use anyone bandwidth except my own. Since you like analogy's so much, an unprotected wifi is analogous to a public museum. Anyone is welcome to stop by and check it out. a poorly secured network (mac filtering, wep, etc.) Is more like an amusement park. There's lots of stuff going on inside, there's a way in but you have to pay for it. If your sneaky you can get in without having to pay for it. a wired lan is going to be more like a federal penitentiary with gaurds posted everywhere and bloodhounds all over making sure everything is all good. and the 100% secured network (a computer isolated with no network access or a group of computers only interconnected to each other with no outside access) would be like alcatraz surrounded by molton lava. |
|
10-04-2004, 06:25 PM | #31 (permalink) | |
Junkie
|
Quote:
Hacker originally meant someone who was technically astute and had excellent skills. It didn't have any negative or security related conotations at all. But today it does. If "most" people thinks hijacking bandwidth is hacking, then ipso facto it IS hacking. Anyway, I know stealing someone's bandwidth, from an unsecured WLAN, is not hacking in the traditional meaing of the word, but so what? With regards to the analogies you use, I think they're funny. Funny is a good way. :-) Mr Mephisto |
|
10-04-2004, 06:45 PM | #32 (permalink) |
Flavor+noodles
Location: oregon
|
To bad I dont have neighbors like that. My signal wont reach to my room down stairs(not a tec person) I even bought a new wireless, so I had to bring it back. I need to get another cable modem and put it in my room I guess.
__________________
The QTpie |
Tags |
networks, wireless |
|
|