It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

WiFi threat: Attention ATS wireless users

page: 2
21
<< 1    3  4 >>

log in

join
share:

posted on Dec, 29 2011 @ 09:13 PM
link   
reply to post by _R4t_
 


Thank you.

Would you be willing to throw down with your favorite routers?

And what do you think of the DD-WRT Linux firmware?

Thanks friend.





posted on Dec, 29 2011 @ 09:14 PM
link   
reply to post by benrl
 


When I was a contractor for the com companies installing broadband I use to make a lot of money on the side by using that exact dialogue. "You know how to encrypt this right?", "No, why is that important?" "Because, if one of your neighbors decides to send a death threat to the white house or download kiddy porn guess who's door is getting kicked in." Was almost always good for an extra hundred.

But like I said total security of any form is an illusion, any one who says otherwise is a fool.



posted on Dec, 29 2011 @ 09:15 PM
link   

Originally posted by Frater210
reply to post by Pixiefyre
 


No, I know, you are totally correct, push button and return later. I know. The OP is totally correct as well. There should be a post about this every day. What the hell are we going to do about this? Can't someone create some kind of "kaleidoscopic key generator" or something? I know we will solve it, but considering that all the security options offered by the routers sent to most folks by their ISPs are now moot, what is the next best go to?

I was thinking it would be a Freedombox type setup up (linked in my post above) which seems to function as a secure proxy through which all household traffic is filtered. What do you think? Have I got that straight?



I guess you could but then again I could use a side channel attack and still get your stuff... as example lets say your using a PS2 keyboard... I have a device I can hook in the power outlet and get every keystroke you'll ever type just by plugged my rig in a power socket outside your house...

That's only one of the many other possibilities, I could hack your iphone's bluetooth, use the IR and hack the key out of there... hell even your fax if not configured properly and hooked to a ethernet cable could allow me enough time in to break your router's admin panel


The safest way to use a computer is to assume someone's watching all the time, and even though computer banking is "practical" well "practical" isn't always better...

edit on 29-12-2011 by _R4t_ because: (no reason given)



posted on Dec, 29 2011 @ 09:18 PM
link   
reply to post by _R4t_
 


Awesome post. Tell the truth brother. What else do I need to look at. I am dying to learn this stuff and I'm a total 2600 fanboy. Bring it, Jedi Master _R4t_.




posted on Dec, 29 2011 @ 09:18 PM
link   
Deauth attack and capture of keyed packets takes seconds. Then you can run away with the .cap file and brute force with elcomsoft running on multiple gpu's.



posted on Dec, 29 2011 @ 09:20 PM
link   
reply to post by v1rtu0s0
 





Deauth attack and capture of keyed packets takes seconds. Then you can run away with the .cap file and brute force with elcomsoft running on multiple gpu's.


You're making me horny. Keep talking dirty baby.




posted on Dec, 29 2011 @ 09:20 PM
link   
Oh btw just a hint, if any of you guys is using a "Speedtouch" "Thompson Gateway" modem/router and your network name by default will be something like "ThompsonXXXXXXX" the XXXXXXX sounds like a random serie of numbers but its not once reverse engineered you can get the key of your wireless... Its extremely easy to do there's even some IPAD/IPHONE apps that'll do it for you... even web based tools... check it and try it for yourselves if you don't believe me and you have one lol



posted on Dec, 29 2011 @ 09:23 PM
link   

Originally posted by Frater210
reply to post by _R4t_
 


Awesome post. Tell the truth brother. What else do I need to look at. I am dying to learn this stuff and I'm a total 2600 fanboy. Bring it, Jedi Master _R4t_.



No need to try to polish my rear end dude, I'm happy to help others with what I know... Just use your computer wisely and don't do/put things on there you don't want others to find because there's no such thing as privacy in the computer industry I know this first hand...



posted on Dec, 29 2011 @ 09:25 PM
link   

Originally posted by v1rtu0s0
Deauth attack and capture of keyed packets takes seconds. Then you can run away with the .cap file and brute force with elcomsoft running on multiple gpu's.


Really??? And what if there's no one connected to the AP when you're running your deauth attack? Then watcha gonna do silly?



posted on Dec, 29 2011 @ 09:34 PM
link   

Originally posted by _R4t_

Originally posted by v1rtu0s0
Deauth attack and capture of keyed packets takes seconds. Then you can run away with the .cap file and brute force with elcomsoft running on multiple gpu's.


Really??? And what if there's no one connected to the AP when you're running your deauth attack? Then watcha gonna do silly?



I see you are trying to patronize me with your uber 1337 attitude. I understand how it works, but if it's a public AP, most likely someone will be connected during a peak time of the day.



posted on Dec, 29 2011 @ 09:36 PM
link   

Originally posted by Frater210
reply to post by _R4t_
 


Thank you.

Would you be willing to throw down with your favorite routers?

And what do you think of the DD-WRT Linux firmware?

Thanks friend.



I use a simple Dlink on 64bit WEP
but its not connected to my inner house network its just used as a bait so I can f*** with the kids who tries to break into it thinking they are on my network... They just get gated into a VMWare fake network running multiple diff OS's.

I like to bait them... it give them something to hone their teeths on and it gives me a good clue of who to keep an eye on around so that my neighbors are safe...

I use good old ethernet cables...



posted on Dec, 29 2011 @ 09:43 PM
link   

Originally posted by v1rtu0s0

Originally posted by _R4t_

Originally posted by v1rtu0s0
Deauth attack and capture of keyed packets takes seconds. Then you can run away with the .cap file and brute force with elcomsoft running on multiple gpu's.


Really??? And what if there's no one connected to the AP when you're running your deauth attack? Then watcha gonna do silly?



I see you are trying to patronize me with your uber 1337 attitude. I understand how it works, but if it's a public AP, most likely someone will be connected during a peak time of the day.



Ahh c'mon don't take it all personal man, I'm not trying to pull any attitude on you lol. I just tried pointing out the fact that you seemed to have provided this answer as an all around solution for cracking wifi in general when the proposed attack focus mainly on WEP and although can be performed on WPA is of very very little use unless you have huge amounts of data...

The amount of data you'll catch in seconds will take you years and years to crack... the more you have data the more your attacks are effective... there's no slow route in hacking its nothing like movies... it take time, patience and perseverance...

People that has the skills to do this within a day don't have time to waste with just anyone's personal computer... they have bigger fishes to catch. No offence meant in anyways.



posted on Dec, 29 2011 @ 09:45 PM
link   

Originally posted by Frater210
reply to post by v1rtu0s0
 





Deauth attack and capture of keyed packets takes seconds. Then you can run away with the .cap file and brute force with elcomsoft running on multiple gpu's.


You're making me horny. Keep talking dirty baby.



I'll shut up now I don't want to spam or kill the AP's thread by starting a flame/nerd war on it, if you have any questions security wise I'd be happy to help you bud, just PM me but please no "can you hack my gf's email" or whatever else alike I will simply delete them and never bother again.



posted on Dec, 29 2011 @ 09:57 PM
link   

Originally posted by _R4t_

Originally posted by v1rtu0s0

Originally posted by _R4t_

Originally posted by v1rtu0s0
Deauth attack and capture of keyed packets takes seconds. Then you can run away with the .cap file and brute force with elcomsoft running on multiple gpu's.


Really??? And what if there's no one connected to the AP when you're running your deauth attack? Then watcha gonna do silly?



I see you are trying to patronize me with your uber 1337 attitude. I understand how it works, but if it's a public AP, most likely someone will be connected during a peak time of the day.



Ahh c'mon don't take it all personal man, I'm not trying to pull any attitude on you lol. I just tried pointing out the fact that you seemed to have provided this answer as an all around solution for cracking wifi in general when the proposed attack focus mainly on WEP and although can be performed on WPA is of very very little use unless you have huge amounts of data...

The amount of data you'll catch in seconds will take you years and years to crack... the more you have data the more your attacks are effective... there's no slow route in hacking its nothing like movies... it take time, patience and perseverance...

People that has the skills to do this within a day don't have time to waste with just anyone's personal computer... they have bigger fishes to catch. No offence meant in anyways.



That depends on your processing power. I never said it could be cracked in seconds, I said captured in seconds. From there, if you have numerous gpu's or a cluster and use something like elcomsoft, it won't take years. Of course it depends on the length and complexity, but utilizing the most compressed rainbow tables and fast processing with gpus (cuda enabled) could yield it in hours or days.



posted on Dec, 29 2011 @ 11:06 PM
link   
The first thing I noticed when issued with my wi-fi router was that the password issued to me from the telco was numeric only. I immediately mentioned to my partner that this was wide open to a brute force attack. It's so obvious.. and if a hack like me (only an IT diploma) can recognise this in less than 10 seconds, one wonders what brains-trust these companies creating the technology are hiring. It's ridiculous!

IRM
edit on 29/12/11 by InfaRedMan because: (no reason given)



posted on Dec, 30 2011 @ 12:21 AM
link   
reply to post by ludshed
 


Yes for a long time I was in charge of a national chains repair team, I used to give the whole spiel of internet security.

Basically its like real life, if your careless your gona get robbed, and if that burglar happens to really know what hes doing and has the motivation and proper tools hes going to get in no matter what...

I can look on the files of all my neighbors cause WAP security isn't even on let alone having to break through.

Thats like going through life with your doors wide open on your car with the keys in it.



posted on Dec, 30 2011 @ 12:28 AM
link   
reply to post by _R4t_
 


Not scared, Im no internet n00b, Ive been selling and building PC's since windows 95, worked for Microsoft for a while (not bragging cause trust me that means jack and squat).

Im always amazed by the sheer lack of computer knowledge from a lot of people on ATS.

When ever I encounter internet users who know almost nothing about the machines they are using it always reminds me of the stereotypical women driver who does not know anything about the vehicle shes using (stereo type, not serious)

Its a very similar situation, people are using a very powerful tool that contains valuable information, you would think people would take the time to learn some basics... But I digress from my rant... lol



posted on Dec, 30 2011 @ 12:52 AM
link   
The best solution to all of this.

BTW: this '10 hour' thing is based on a hack being able to compromise the DST in your video hardware. The DST chip can run try/fail brute force code very fast, however you would certainly notice it, because your video screen would go berzerk, and just reboot it and run an anti-malware program that can easily find the infected driver (AST, Nvidea, etc) and get rid of it.

1. Use a router like a Buffalo, which can accept the Linux kernel with DD-WRT. Load it and install it. Secure your router administrator account with a strong password, hide your SSID.
2. Use WPA2. Make the passcode based on 15-20 chars in a string with mixed Upper, Lower and Special chars.
3. Turn on the MAC database filter, and only type in the MAC addresses of the devices you allow to connect to your wireless router.
4. If you are a windows user, use the net shell and clear your stack, once a week. NETSH WINSOCK RESET from the command line. This dumps any non-standard 'additions' to your TCPIP stack.
5. Ensure you are using HTTPS for any transfers on the web that you require security.
6. Reset your router passwords, Wpa2 passkeys once a month.
7. Locate your HOSTS file (in windows it is C:windowss\ystem32\drivers\etc\hosts. Use the attrib command in the etc directory like this: ATTRIB hosts +r +h +s ( sets the file read-only, hidden and system)

NOBODY GONNA HACK YA
edit on 30-12-2011 by charlyv because: spelling where caught

edit on 30-12-2011 by charlyv because: (no reason given)

edit on 30-12-2011 by charlyv because: (no reason given)

edit on 30-12-2011 by charlyv because: This stupid editor cannot cache slash slash



posted on Dec, 30 2011 @ 01:35 AM
link   
reply to post by _R4t_
 





People that has the skills to do this within a day don't have time to waste with just anyone's personal computer... they have bigger fishes to catch. No offence meant in anyways.


That was true a few years ago. It is not now. Today, anyone that has a reasonable life, with some cash in the bank and a heavy checking account is a target. Finding out all the above is so easy, it can be done almost legally. The hack is not easy, but if someone can target your usage, and find the places you did not plug up the holes, then they can bring in big guns that will hack you if you are an average user. This is the way it works mostly. Scouts, finding prospective marks, then getting the easy stuff, and passing it on to the ones that will do you so easy, if you are not well protected.



posted on Dec, 30 2011 @ 03:56 AM
link   
I can crack into most WiFi spots in about 2 hours, WiFi has had # security for years



new topics

top topics



 
21
<< 1    3  4 >>

log in

join