I was looking in my router properties and found a way to turn it on. So, I turned it on. A minute later I checked it and this is what my incoming log looks like: Am I being raped?
Source IP Destination Port Number
121.220.59.9x 6881
122.127.55.10x 6881
90.224.160.20x 6881
65.125.141.1x 6881
24.235.229.24x 6881
76.174.211.3x 6881
221.208.208.9x 1027
71.70.171.2x9 6881
201.236.60.2x9 6881
91.23.1x0.36 6881
213.5.2x3.60 6881
61.53.x2.26 6881
82.61.23x.24 6881
75.67.2x1.231 6881
213.34.x37.129 22377
-
John Ratsey Moderately inquisitive Super Moderator
Your router should have a page listing what computers are logged on to it. That's where I would look for visitors.
John -
well its quite possible.......if you dont have it secured, might as well add some light security to it
here is a port list to explain what some of them are for
http://www.infosyssec.org/infosyssec/security/portlookup.html
and here is a how to on securing your router
http://www.onguardonline.gov/wireless.html
specifically I dont know which model you have so a picturegraph I cannot provide, maybe if you print your model number I can find an easy solution for you to follow -
Just enable WEP security and put a passwd on it....then you can pair the connection only with the PCs/Laptops you give access (key) to.
Leaving it open (no passwd) is considered a HIGH risk in terms of privacy and mal-use. -
Have you been using P2P app at that moment? It looks like BT client is working.
As for security- use WPA2 with AES. WEP is lasts 20/30sec these days and Atheros cards are quite widely used... -
AKAJohnDoe Mime with Tourette's
I set up my wireless with WPA/PSK-TKIP and do not broadcast the SSID. I did not go down to MAC filtering, but I do review the router logs periodically.
-
-
just register your IPS to specific computers in your house. WPA WEP and other encryption is worthless. there are brood force programs that break encryptions easily or any experienced drive by hacker and break into thous computer easily. and mac addresses arnt even safe there are mac spoofers out there. Sorry to break it to you guys wireless networks arnt that safe..
-
AKAJohnDoe Mime with Tourette's
I'll stick with WPA/PSK-TKIP with non-broadcasted SSID, myself. -
IMO any security is better than none at all.
-
One weakness of wireless security is implementation of PSK exchange but that can be limited by using strong password and complicated SSID (not related to pass in any way) -
AKAJohnDoe Mime with Tourette's
3DES, too. Please let me know when you have cracked that.
-
Of course for 99.9% of all home users, even 64-bit WEP is all the protection you'll ever need. Because you most likely just aren't that valuable that anyone's going to bother breaking it, especially with so many unsecured networks around. Obviously if you conduct extensive online trading or something of that nature it might be more of a concern, but for that kind of task aren't you going to want the guaranteed stability and security of a wired connection anyways?
-
-
It is a linksys BEFW11S4 so it is kinda ancient as far as wireless routers go. I should probably upgrade..
I'm gonna run though some of the suggestions and see if I can put some secuirty on this thing. -
AKAJohnDoe Mime with Tourette's
Of course, you could be terminally unique and be that .000001% that need more. -
okay um regarding AES.. the encryption is strong i am not going to stop you there but its still crackable with a brute force attack.. *while it would take seriously long to crack and people would give up after 3 years* its still do able.
And the Us government only uses AES for non classified data and they already understand AES is flawed so they use other encryption methods
as for the original point for this problem i think you should just turn down your transmit power on your wireless router to only cover your house and use a directional antenna facing where the majority of the area you need it for and then use a clocked SSID and WPA.
and i agree most home networks dont have anything valuable to steal so no worries ~ sorry i got off on the wrong foot
*Please start sending your hate mail and flame at me thanks* -
First of all- no way can you crack AES in 3 years. It's more like 3.000 years for starters
Second thing- brute force makes sense only with RADIUS servers used as PSK is easier to crack using side attack than breaking the cipher (still not done though)
As for US gov:
-
I just use MAC filtering, permit only PC's on list. I don't get new pc's everyday so it's not really a big deal, if someone visits and needs wireless it only takes a moment to add the MAC. IMO easiest to set up, also no passwords, keys, etc... Is there anything I'm overlooking as to why not to do it this way?
-
-
okay all i was try to say is its possible to break AES thats it >.< but very unlikely.
-
Heh, I was going to correct you about the names of the programs (ethereal and airsnarf), but I see they are real programs. Silly me.
Are other people using my wireless?
Discussion in 'Networking and Wireless' started by braddd, Aug 22, 2007.