The Notebook Review forums were hosted by TechTarget, who shut down them down on January 31, 2022. This static read-only archive was pulled by NBR forum users between January 20 and January 31, 2022, in an effort to make sure that the valuable technical information that had been posted on the forums is preserved. For current discussions, many NBR forum users moved over to NotebookTalk.net after the shutdown.
Problems? See this thread at archive.org.

    Are other people using my wireless?

    Discussion in 'Networking and Wireless' started by braddd, Aug 22, 2007.

  1. braddd

    braddd Notebook Deity

    Reputations:
    44
    Messages:
    834
    Likes Received:
    0
    Trophy Points:
    30
    I was looking in my router properties and found a way to turn it on. So, I turned it on. A minute later I checked it and this is what my incoming log looks like: Am I being raped?

    Source IP Destination Port Number
    121.220.59.9x 6881
    122.127.55.10x 6881
    90.224.160.20x 6881
    65.125.141.1x 6881
    24.235.229.24x 6881
    76.174.211.3x 6881
    221.208.208.9x 1027
    71.70.171.2x9 6881
    201.236.60.2x9 6881
    91.23.1x0.36 6881
    213.5.2x3.60 6881
    61.53.x2.26 6881
    82.61.23x.24 6881
    75.67.2x1.231 6881
    213.34.x37.129 22377
     
  2. John Ratsey

    John Ratsey Moderately inquisitive Super Moderator

    Reputations:
    7,197
    Messages:
    28,841
    Likes Received:
    2,166
    Trophy Points:
    581
    Your router should have a page listing what computers are logged on to it. That's where I would look for visitors.

    John
     
  3. grateful

    grateful Notebook Evangelist

    Reputations:
    36
    Messages:
    380
    Likes Received:
    0
    Trophy Points:
    30
  4. By ToR

    By ToR Notebook Evangelist

    Reputations:
    21
    Messages:
    333
    Likes Received:
    0
    Trophy Points:
    30
    Just enable WEP security and put a passwd on it....then you can pair the connection only with the PCs/Laptops you give access (key) to.
    Leaving it open (no passwd) is considered a HIGH risk in terms of privacy and mal-use.
     
  5. downloads

    downloads No, Dee Dee, no! Super Moderator

    Reputations:
    7,729
    Messages:
    8,722
    Likes Received:
    2,231
    Trophy Points:
    331
    Have you been using P2P app at that moment? It looks like BT client is working.
    As for security- use WPA2 with AES. WEP is lasts 20/30sec these days and Atheros cards are quite widely used...
     
  6. AKAJohnDoe

    AKAJohnDoe Mime with Tourette's

    Reputations:
    1,163
    Messages:
    3,017
    Likes Received:
    0
    Trophy Points:
    105
    I set up my wireless with WPA/PSK-TKIP and do not broadcast the SSID. I did not go down to MAC filtering, but I do review the router logs periodically.
     
  7. Reezin14

    Reezin14 Crimson Mantle Commander

    Reputations:
    365
    Messages:
    934
    Likes Received:
    0
    Trophy Points:
    30
    This is where I would look first also, make sure you know all ip's of pc's that are on your network. Then just setup some security.
     
  8. chinmonkie

    chinmonkie Notebook Evangelist

    Reputations:
    17
    Messages:
    369
    Likes Received:
    0
    Trophy Points:
    30
    just register your IPS to specific computers in your house. WPA WEP and other encryption is worthless. there are brood force programs that break encryptions easily or any experienced drive by hacker and break into thous computer easily. and mac addresses arnt even safe there are mac spoofers out there. Sorry to break it to you guys wireless networks arnt that safe..
     
  9. AKAJohnDoe

    AKAJohnDoe Mime with Tourette's

    Reputations:
    1,163
    Messages:
    3,017
    Likes Received:
    0
    Trophy Points:
    105
    WEP can be broken fairly easily these days. WPA is still somewhat difficult to break. Encryption is hardly worthless. I presume you meant "brute force" as brood force might be construed to be something associated with 17 year cicadas? Anyway, registering IPs makes no sense, really; however, using MAC Address security may, although that is also somewhat easy to spoof these days.

    I'll stick with WPA/PSK-TKIP with non-broadcasted SSID, myself.
     
  10. Reezin14

    Reezin14 Crimson Mantle Commander

    Reputations:
    365
    Messages:
    934
    Likes Received:
    0
    Trophy Points:
    30
    IMO any security is better than none at all.
     
  11. downloads

    downloads No, Dee Dee, no! Super Moderator

    Reputations:
    7,729
    Messages:
    8,722
    Likes Received:
    2,231
    Trophy Points:
    331
    Please don't hesitate to crack AES. When you do- inform US government first, than me if you don't mind :rolleyes:
    One weakness of wireless security is implementation of PSK exchange but that can be limited by using strong password and complicated SSID (not related to pass in any way)
     
  12. AKAJohnDoe

    AKAJohnDoe Mime with Tourette's

    Reputations:
    1,163
    Messages:
    3,017
    Likes Received:
    0
    Trophy Points:
    105
    3DES, too. Please let me know when you have cracked that.
     
  13. lowlymarine

    lowlymarine Notebook Deity

    Reputations:
    401
    Messages:
    1,422
    Likes Received:
    1
    Trophy Points:
    56
    Of course for 99.9% of all home users, even 64-bit WEP is all the protection you'll ever need. Because you most likely just aren't that valuable that anyone's going to bother breaking it, especially with so many unsecured networks around. Obviously if you conduct extensive online trading or something of that nature it might be more of a concern, but for that kind of task aren't you going to want the guaranteed stability and security of a wired connection anyways?
     
  14. Reezin14

    Reezin14 Crimson Mantle Commander

    Reputations:
    365
    Messages:
    934
    Likes Received:
    0
    Trophy Points:
    30
    My thoughts exactly.
     
  15. braddd

    braddd Notebook Deity

    Reputations:
    44
    Messages:
    834
    Likes Received:
    0
    Trophy Points:
    30
    It is a linksys BEFW11S4 so it is kinda ancient as far as wireless routers go. I should probably upgrade..

    I'm gonna run though some of the suggestions and see if I can put some secuirty on this thing.
     
  16. AKAJohnDoe

    AKAJohnDoe Mime with Tourette's

    Reputations:
    1,163
    Messages:
    3,017
    Likes Received:
    0
    Trophy Points:
    105
    And you could add few more 9's to that, ala 99.999999%, if you went with WPA.

    Of course, you could be terminally unique and be that .000001% that need more. ;)
     
  17. chinmonkie

    chinmonkie Notebook Evangelist

    Reputations:
    17
    Messages:
    369
    Likes Received:
    0
    Trophy Points:
    30
    okay um regarding AES.. the encryption is strong i am not going to stop you there but its still crackable with a brute force attack.. *while it would take seriously long to crack and people would give up after 3 years* its still do able.
    And the Us government only uses AES for non classified data and they already understand AES is flawed so they use other encryption methods

    as for the original point for this problem i think you should just turn down your transmit power on your wireless router to only cover your house and use a directional antenna facing where the majority of the area you need it for and then use a clocked SSID and WPA.

    and i agree most home networks dont have anything valuable to steal so no worries ~ sorry i got off on the wrong foot
    *Please start sending your hate mail and flame at me thanks*
     
  18. downloads

    downloads No, Dee Dee, no! Super Moderator

    Reputations:
    7,729
    Messages:
    8,722
    Likes Received:
    2,231
    Trophy Points:
    331
    First of all- no way can you crack AES in 3 years. It's more like 3.000 years for starters :)
    Second thing- brute force makes sense only with RADIUS servers used as PSK is easier to crack using side attack than breaking the cipher (still not done though)

    As for US gov:
    Quotation from Wikipedia from the document also available there.
     
  19. xxvmarcvxx

    xxvmarcvxx Newbie

    Reputations:
    0
    Messages:
    9
    Likes Received:
    0
    Trophy Points:
    5
    I just use MAC filtering, permit only PC's on list. I don't get new pc's everyday so it's not really a big deal, if someone visits and needs wireless it only takes a moment to add the MAC. IMO easiest to set up, also no passwords, keys, etc... Is there anything I'm overlooking as to why not to do it this way?
     
  20. downloads

    downloads No, Dee Dee, no! Super Moderator

    Reputations:
    7,729
    Messages:
    8,722
    Likes Received:
    2,231
    Trophy Points:
    331
    Yeah, there is. Use an app like AirSnare and/or Ethernal and see MACs flying around. Than go to advanced tab of your Wi-Fi card and just type one in and you're on.
     
  21. chinmonkie

    chinmonkie Notebook Evangelist

    Reputations:
    17
    Messages:
    369
    Likes Received:
    0
    Trophy Points:
    30
    okay all i was try to say is its possible to break AES thats it >.< but very unlikely.
     
  22. altimar

    altimar Notebook Enthusiast

    Reputations:
    93
    Messages:
    41
    Likes Received:
    0
    Trophy Points:
    15
    Right. In addition, they can see *all* your traffic since it is not encrypted. IOW, they can see what sites you are visiting and any login/password info not passed through SSL. If you only do one thing to protect your wireless, it should be encryption. It takes a reasonably knowledgeable person to even break 64bit WEP. As stated earlier, even the slightest protection will make you a harder target than 75% of the networks out there.

    Heh, I was going to correct you about the names of the programs (ethereal and airsnarf), but I see they are real programs. Silly me. ;)