solariusx3
Member
Few days ago i experienced my wifi connection getting funky. D/C frequently and sometimes windows does not show connected status at the task bar even when connected.
Finally logged into my router to check. To my horror, i was logged out. On my router status page i saw an unknown pc name on my dhcp lease entry. I did a factory rest and changed password.
How is it possible for some to hack my wireless ? I consider myself quite carefull when it comes to IT security. Is there an exploit for dd-wrt ? I'm on a bufallo WHR-HP-G54 running dd-wrt v23 SP2. I use WPA-PSK on AES. I thought its relatively safe since to crack would take quite long. I also disabled broadcast SSID, left dhcp on for simplicity but limit to <5 leases. mac address filter was off. I know that most of these measures would be useless to a determined attacker, but would deter would-be moochers. How could he have done it.:shocked:
Could it be due to the password length or strength. I have previously a 14char alphanumeric only password. How feasible would it be to brute force WPA-AES? Since that guy managed to control my router, he would be able to map my internal network and hosts, possibably sniff my traffic on my LAN ? or just WLAN what else should i look out for?😕 How can i prevent future occurances? Pls help thanks.🙁
Finally logged into my router to check. To my horror, i was logged out. On my router status page i saw an unknown pc name on my dhcp lease entry. I did a factory rest and changed password.
How is it possible for some to hack my wireless ? I consider myself quite carefull when it comes to IT security. Is there an exploit for dd-wrt ? I'm on a bufallo WHR-HP-G54 running dd-wrt v23 SP2. I use WPA-PSK on AES. I thought its relatively safe since to crack would take quite long. I also disabled broadcast SSID, left dhcp on for simplicity but limit to <5 leases. mac address filter was off. I know that most of these measures would be useless to a determined attacker, but would deter would-be moochers. How could he have done it.:shocked:
Could it be due to the password length or strength. I have previously a 14char alphanumeric only password. How feasible would it be to brute force WPA-AES? Since that guy managed to control my router, he would be able to map my internal network and hosts, possibably sniff my traffic on my LAN ? or just WLAN what else should i look out for?😕 How can i prevent future occurances? Pls help thanks.🙁