Wireless Security

OK, Geeks of the world UNITE!!!!!

Wireless settings and security.

They say that if you can scan, and pickup other "Site Surveys", which disclose that you're in a hot spot, then you can piggy back off their carrier signal and surf the internet free of charge, and most likely without their server / router ever realizing that they are hosting additional nodes, namely your sniffer or wireless card.

That being the case, here are some important hacker questions that are really very basic:

1) after sync'ing on their node or hotspot and surfing the web through their connection, becuase they have not enabled either encryption or any other basic defensive steps

a) what else can you do?, other than just surf?

2) are you able to actually get into their system or their machines or configurations?

3) can you change their router settings, or see their linked machines?

4) can you notify them that they've been hacked?
 
Only know about number 4, had a friend get hacked on his cable modem and they sent a message to him by printing on his printer to get a firewall. Have no idea how you would do something like that myself.
 
Quote from limitdown:

OK, Geeks of the world UNITE!!!!!

Wireless settings and security.

They say that if you can scan, and pickup other "Site Surveys", which disclose that you're in a hot spot, then you can piggy back off their carrier signal and surf the internet free of charge, and most likely without their server / router ever realizing that they are hosting additional nodes, namely your sniffer or wireless card.

That being the case, here are some important hacker questions that are really very basic:

1) after sync'ing on their node or hotspot and surfing the web through their connection, becuase they have not enabled either encryption or any other basic defensive steps

a) what else can you do?, other than just surf?


the wifi hotspot software is getting better. after getting on their network you first have to goto a ssl page and login - this opens the firewall for your ip to get out to the net.


2) are you able to actually get into their system or their machines or configurations?

yeah if they are not blocking wireless customers telnet/ssh access to the routers/switches - youll still need login information


3) can you change their router settings, or see their linked machines?

if you have telnet/ssh access and login information. linked machines? - other wireless customers could be VLANed off from you by the access point - no access to them or back. if wired servers are broadcasting their presence (windows) on the same subnet as the wireless clients they'll could show up. just depends how they set things up.


4) can you notify them that they've been hacked?

if you can figure out who you hacked yeah why not.

havent tried it but...
http://sourceforge.net/projects/airsnort/
 
Quote from limitdown:

OK, Geeks of the world UNITE!!!!!

Wireless settings and security.

They say that if you can scan, and pickup other "Site Surveys", which disclose that you're in a hot spot, then you can piggy back off their carrier signal and surf the internet free of charge, and most likely without their server / router ever realizing that they are hosting additional nodes, namely your sniffer or wireless card.

That being the case, here are some important hacker questions that are really very basic:

1) after sync'ing on their node or hotspot and surfing the web through their connection, becuase they have not enabled either encryption or any other basic defensive steps

a) what else can you do?, other than just surf?

*** Lotsa nefarious stuff :D

2) are you able to actually get into their system or their machines or configurations?

*** Yes, but it requires some hacking knowledge and apps.

3) can you change their router settings, or see their linked machines?

*** Again, yes, but not easily if the router pswd has been changed from the default.

4) can you notify them that they've been hacked?

*** Yes, as has been previously mentioned.

riskarb
 
some of these are good answers,

some don't even know how to use the text box to make replies...

Airsnort was known, and is quite surprising.


There are ways to limit the markets that the packets send, along with the SSID so that one really doesn't know its his network transmitting, hence being sniffed and decoded.

The need to insittute basic and complex and rotating changes in ones' security protocol (mix of variable features) so that one secures their home office is apparent.


This discussion will benefit all who drop by and either comment or add a comment to this thread.


ok, geeks of the world, UNITE and let's drop some knowledge on these souls....
 
Back
Top