ramdisc Posted October 4, 2005 Posted October 4, 2005 Hello, I saw an episode of CSI: Miami. And this guy with a laptop was able to steal signals from across the building so he can go into the Net. So his company won't be able to catch him surfing the Net during work. Is this even possible!? People with laptop and wireless connection can easily steal signals by just being in range of the whatever-you-call-it!? There is no protection of any kind to prevent others from stealing it?
mezarashi Posted October 4, 2005 Posted October 4, 2005 Yes, this is very real. The "signal" is a wireless LAN signal. They can cover 20m to 30m. Most universities have a wireless LAN network. Anybody with a card can get access. Most corporate systems now are implementing a security check of course, meaning once a connection is established you must log in with a proper user/pass to gain access. Most home users however don't use this or don't know about it. I heard stories of so many friends who are stealing their neighbor's internet. Many people install an unprotected wireless network and obviously the signal can cross the border.
insane_alien Posted October 4, 2005 Posted October 4, 2005 if the wireless network has a decent range(most don't) and some crappy security(most have good security) then it is completely possible
Klaynos Posted October 4, 2005 Posted October 4, 2005 WEP is very very easy to break. WPA is breakable but is considerably harder than WEP. Most wifi access points can be locked to only allowing specific mac adresses (a unique code designated to network adapters)... It is not fool proof...
JC1 Posted October 4, 2005 Posted October 4, 2005 WEP is very very easy to break. But it is secure enough for home users to prevent this sort of war-driving attack. WPA is breakable but is considerably harder than WEP. It's much harder than WEP due to the fact that TKIP' date=' its security protocol, is incorporated with 802.1x, EAP and Radius server. Most wifi access points can be locked to only allowing specific mac adresses (a unique code designated to network adapters)... It is not fool proof... This is nothing as some of wireless network adapter's program provides the cloning utility. In other words, we can clone our card to whatever MAC address we want. Therefore, by observing the plaintext of MAC address in the header of packet data of the network traffic, we can identify the mac of source and destination devices, then from that we can clone our card to be them.
JC1 Posted October 4, 2005 Posted October 4, 2005 WEP is very very easy to break. But it is secure enough for home users to prevent this sort of war-driving attack. WPA is breakable but is considerably harder than WEP. It's much harder than WEP due to the fact that TKIP' date=' its security protocol, is incorporated with 802.1x, EAP and Radius server. And the way that TKIP uses the encryption key (per-packet key mixing) is even more harder for one to discover the key. Most wifi access points can be locked to only allowing specific mac adresses (a unique code designated to network adapters)... It is not fool proof... This is nothing as some of wireless network adapter's program provides the cloning utility. In other words, we can clone our card to whatever MAC address we want. Therefore, by observing the plaintext of MAC address in the header of packet data of the network traffic, we can identify the mac of source and destination devices, then from that we can clone our card to be them.
Royston Posted October 4, 2005 Posted October 4, 2005 WEP is very very easy to break. Especially if the default security passwords are used. I take it it's illegal to sponge off over peoples signals ?
Klaynos Posted October 4, 2005 Posted October 4, 2005 Especially if the default security passwords are used. I take it it's illegal to sponge off over peoples signals ? In most countries I presume' date=' it is *probably* illegal in the UK. This is nothing as some of wireless network adapter's program provides the cloning utility. In other words, we can clone our card to whatever MAC address we want. Therefore, by observing the plaintext of MAC address in the header of packet data of the network traffic, we can identify the mac of source and destination devices, then from that we can clone our card to be them. Very true but if someone is launching an attack with no previouse knowledge, every little helps :|
JC1 Posted October 4, 2005 Posted October 4, 2005 Especially if the default security passwords are used. What do you mean by the default security pwd?
JC1 Posted October 4, 2005 Posted October 4, 2005 Very true but if someone is launching an attack with no previouse knowledge, every little helps :| that's right. It always starts from the basic protections. MAC filter is one of them. People should make use of the full available security measures that their AP and wireless cards provide, instead of merely taking it out of the box and plugging it in with all the default set.
Klaynos Posted October 4, 2005 Posted October 4, 2005 Hiding SSID is another thing people should do, I know of 3 wifi networks around me, and in every case I can tell you exactly what type of AP they use as they havn't changed from the default SSID and wouldn't be surprised if the rest of their settings are also set to the default
Royston Posted October 5, 2005 Posted October 5, 2005 What do you mean by the default security pwd? To protect a WEP Lan set up you have the option of a password to secure your signal from rogue internet users. There are a number of default passwords that are available which are incredibly obvious and (so I've heard) often used. eg PF1,PF2,PF3 et.c So it's in people's best interest to think of an original password...unless they have no problem with someone using their signal.
JC1 Posted October 7, 2005 Posted October 7, 2005 To protect a WEP Lan set up you have the option of a password to secure your signal from rogue internet users. There are a number of default passwords that are available which are incredibly obvious and (so I've heard) often used. eg PF1,PF2,PF3 et.c So it's in people's best interest to think of an original password...unless they have no problem with someone using their signal. I thought you were talking about the default pwd of the AP itself. Well, i never knew that there are the default WEP pwd. AP usually have a feature that you can input the passphrase (of your own word) and from that it generates the 4 random hex number as the encryption keys one of which you would use and set in the supplicants.
5614 Posted October 7, 2005 Posted October 7, 2005 Picking up someone else's wireless connection can be as easy as having a wireless NIC & being in range. The computer automatically picks up the signal and then you just click connect to the signal. Encryption and security measures are mentioned in other posts so I wont repeat it all.
Royston Posted October 7, 2005 Posted October 7, 2005 I thought you were talking about the default pwd of the AP itself. Well, i never knew that there are the default WEP pwd. AP usually have a feature that you can input the passphrase (of your own word) and from that it generates the 4 random hex number as the encryption keys one of which you would use and set in the supplicants. Yeah, they vary dependant on manufacturer. I know some Hex of 10 or 26 characters only have 6 letters and obviously 0-9 to use. Ok there's a lot of combinations there...but with unlimited tries and a bit of logic it won't take long to start using somebody elses signal. I'm sure all this will be considered with future models.
Mayflower Posted October 7, 2005 Posted October 7, 2005 There is no protection of any kind to prevent others from stealing it? Judging by what I've read on other forums... no there isn't a way to prevent it. These 'computer experts' basically said that all forms of wireless router security don't work. We had our net access being used by someone else in this apartment building... hopefully not anymore. It's frusturating to know that it's (supposedly) impossible to prevent.
JC1 Posted October 8, 2005 Posted October 8, 2005 Picking up someone else's wireless connection can be as easy as having a wireless NIC & being in range. The computer automatically picks up the signal and then you just click connect to the signal. Encryption and security measures are mentioned in other posts so I wont repeat it all. Would you mind to find me the links to those posts?? i am interested in reading them. Thank you in advance.
5614 Posted October 8, 2005 Posted October 8, 2005 Would you mind to find me the links to those posts?? i am interested in reading them. Thank you in advance. Post #2: "once a connection is established you must log in with a proper user/pass to gain access." Here we learn about a username/pwd Post #4: "WEP is very very easy to break." Here we learn about WEP which is a 802.11 encryption protocol Post #4: "WPA is breakable but is considerably harder than WEP." Here we learn about WPA vs. WEP Post4: "wifi access points can be locked to only allowing specific mac adresses (a unique code designated to network adapters)" Here we learn about specifying mac addresses Post5: "It's much harder than WEP due to the fact that TKIP, its security protocol, is incorporated with 802.1x, EAP and Radius server." You said that yourself Post11: "Hiding SSID is another thing people should do" Here we learn about SSID (service set identification) Post12: "To protect a WEP Lan set up you have the option of a password to secure your signal from rogue internet users" Here we learn about pwd protecting the WEP setup. Post13: "AP usually have a feature that you can input the passphrase" You said that yourself. That is the kind of stuff I was referring to. What did you mean by asking that question?
JC1 Posted October 12, 2005 Posted October 12, 2005 Post #2: "once a connection is established you must log in with a proper user/pass to gain access."Here we learn about a username/pwd Post #4: "WEP is very very easy to break." Here we learn about WEP which is a 802.11 encryption protocol Post #4: "WPA is breakable but is considerably harder than WEP." Here we learn about WPA vs. WEP Post4: "wifi access points can be locked to only allowing specific mac adresses (a unique code designated to network adapters)" Here we learn about specifying mac addresses Post5: "It's much harder than WEP due to the fact that TKIP' date=' its security protocol, is incorporated with 802.1x, EAP and Radius server." You said that yourself Post11: "Hiding SSID is another thing people should do" Here we learn about SSID (service set identification) Post12: "To protect a WEP Lan set up you have the option of a password to secure your signal from rogue internet users" Here we learn about pwd protecting the WEP setup. Post13: "AP usually have a feature that you can input the passphrase" You said that yourself. That is the kind of stuff I was referring to. What did you mean by asking that question?[/quote'] Damn, i was thinking there might have had this topic posted in dept regarding 802.11 security measures in the other threads.
ecoli Posted October 12, 2005 Posted October 12, 2005 I doubt most homeowners know how/bother to setup a WEP or WPA encryption for their wireless network. My house is too secluded, but I was able to "steal" someone's signal when I was at my Grandpa's house.
5614 Posted October 14, 2005 Posted October 14, 2005 I don't have a wireless network for a few reasons: 1) More expensive 2) Security 3) Harder to troubleshoot (though I spose in some respects that's good, learning & a challenge) this would apply to others more so than myself 4) Why bother? You know how some people like to have electronic parts lying around, (I do) and I also like having wires lying around, dunno why, it just kinda looks cool! Regardless the network cable still runs through the roof and behind my bed/desk so you can't see it anyway. The point is I have no problem with cables... so therefore I have no reason to go wireless. Anyway, it's true that most people don't bother with WEP or WAP, because they don't know what it is, don't know hot to setup it up or just don't see the need to... whenever my cousin comes here (she has a wireless NIC (can I call that a WNIC?)) so she can pick up the neigbour's signal just by selecting 'connect' when her laptop automatically tells her she is within range of a wireless network.
Royston Posted October 14, 2005 Posted October 14, 2005 Anyway' date=' it's true that most people don't bother with WEP or WAP, because they don't know what it is, don't know hot to setup it up or just don't see the need to... whenever my cousin comes here (she has a wireless NIC (can I call that a WNIC?)) so she can pick up the neigbour's signal just by selecting 'connect' when her laptop automatically tells her she is within range of a wireless network.[/quote'] You can do the same as most of you probably know with PSP's. Also in the UK they've set up transmitters in train tunnels so you can log on using a lap top whilst on the move. If you're lucky enough to live in range you have perfectly legal free internet. Obviously there are no protocols otherwise they'd be pointless. I think the majority of people in my local area are more clued up to security, the majority of signals I've seen on a friends lap top were WEP / WPA.
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now