Articles

Who's trying to access my Wireless

White Box
December 5, 2006 at 12:29:38
Specs: Winxp, 1.0

Is there a way to tell if anyone has tried to access my wireless from outside of my residence?


See More: Whos trying to access my Wireless

Report •


#1
December 5, 2006 at 13:05:29

Only if they succeeded and your router has an inbuilt log that you can view to see what connections/IPs have been allocated.
Are you using any kind of security encryption? If so what level? 64bit WEP is a waste of time. Took a visitor all of 10 minutes to penetrate mine at 2.00 am one morning from a car parked out in the street. In some you can configure your router to filter for mac addresses, restrict the available IP range so that there are no free IPs available, Use 128 bit WEP or WPA/PSK if your hardware is capable.

I used to have a signature but it disappeared and I just couldn't be bothered writing another so please feel free to ingore this.


Report •

#2
December 5, 2006 at 16:01:33

I would also turn off SSID broadcasting and changing the SSID name. You can also limit the number of IP addresses that your router can assign. and also use nothing but WPA.

Report •

#3
December 5, 2006 at 18:06:21

There is little use in trying to secure wireless for most people. Consider not using it or use it for short periods only. If you leave it on and never change the key it is more likely that it can be cracked. SSID does little.

Download remote-exploits live cd. It has tools to determine how secure your site is. If you use all the tools you will find out how not secure it all is. Might find who is trying to access your system too.

I read it wrong and answer it wrong too. So get off my case you goober.


Report •

Related Solutions

#4
December 5, 2006 at 21:54:54

The intruder probably saw all your p0rn, online banking info, and those pictures of your wife you didn’t delete. These war drivers today are very smart and computer savvy.

Richard59, suggested that you secure your system with 128 Bit WEP security. DON’T!!! My little neighbor kid can crack your 128 Bit WEP security in less than 15 minutes. I suggest you enable WPA or WPA2 if your linksys router supports it.

I also suggest you enable MAC address filtering and disable your SID broadcasting. Not that these two things can’t be cracked of spoofed, but that add an extra layer of difficulty to breaking into your wireless network. I may be that little bit extra that makes an intruder decide to move on to an easier target.

One last thing, make sure you change the default password to your router.


Report •

#5
December 6, 2006 at 03:21:54

It's not just the router that needs to support WPA. The NICs in the wireless clients also need to support this protocol. Not all do. Go with the highest level of security your hardware supports.

I used to have a signature but it disappeared and I just couldn't be bothered writing another so please feel free to ingore this.


Report •

#6
December 6, 2006 at 09:47:18

- All versions of WEP are easily cracked.

- Disabling SSID broadcast or changing your SSID name from the default are useless.

- MAC filtering is useless.

Hacks for all of these have been available for years and even a script kiddie can execute them. If you want real wireless security do the following:

- Enable 128 bit WPA security on your system. If individual components don't support this standard UPGRADE!!!

- Use a truly random WPA password. There are websites that will generate this for you if you don't want to write or d/l a script to do it for you.

- Change your WPA password about once a month. Store it in a text file on a thumb drive and use this to change the passwords on all your clients. Or use WPA-PKA if your network will support that.

- Change your router's default password.

- Regularly backup critica files and don't store important user data (tax records, business data, etc.) on your hard drive. Write it to a CD-RW, make a copy, and store the 2nd copy offsite.

-


Report •

#7
December 7, 2006 at 04:04:48

If you don't use wireless, turn it off.
If you do, turn it off when not in use, person will have to find another way to connect.
Spy on the illegal user to find out who he or she is.

Report •


Ask Question