• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

Track unauthorized person on your wireless network

I think someone is getting into my wireless network. I am not broadcasting my ssid, I have disabled dhcp, I am using WEP2 and I am using mac address filtering. What else can I do to secure my network. Also, is it possible to track a person who is on your network without your permission. I mean it is a wireless network so he can't be too far. I just want to knock on his door and say hello...
 
Originally posted by: psychofunk
I think someone is getting into my wireless network. I am not broadcasting my ssid, I have disabled dhcp, I am using WEP2 and I am using mac address filtering. What else can I do to secure my network. Also, is it possible to track a person who is on your network without your permission. I mean it is a wireless network so he can't be too far. I just want to knock on his door and say hello...

List of things that would only protect your network from your grandparents:
Not broadcasting the SSID
Disabling DHCP
MAC Filtering

WEP is fairly easily defeated by someone with a bit of knowledge and enough motivation.

What else can you do to secure? Run WPA2.
 
My mistake I am using WPA2. As for what makes me believe that someone is on my network, I allow only 3 total connections to my router (main computer, laptop & iphone) and all of a sudden I am not being allowed on with my laptop (which I am guessing is because someone else is using a connection). I don't know what else to do hence why I want to track, but I mean real time track and see where info is being transmitted....could i say use my old axim x51v pda to follow packets or something....
 
Originally posted by: psychofunk
could i say use my old axim x51v pda to follow packets or something....

No. This isn't startrek. When a device is connected wirelessly the antenna is sending out the signal (in most cases) omni directionally, its not a straight line connection that you can follow like a cable. Im sure the FCC or a radio engineer could home in on the particular broadcast.

Simply look at the lan section in your routers config page, it will no doubt have a list of all the devices connected. If there is infact someone else that was some how able to crack your WPA2 simply change the key.

My guess is that there is simply something wrong with the laptop.
 
If you are using WPA2 and some else broke into your system it would the First time that a main street person broke WPA2.

Find him fast and make him sign a contract that he is working for you. Security companies would pay you as his agent a fortune to sign him as a contractor.

In any case what happened to you has probably to do with IP/.MAC reservation, or and, IP lease issues in the Router, and has nothing to do with braking into a system.
 
Originally posted by: JackMDS
If you are using WPA2 and some else broke into your system it would the First time that a main street person broke WPA2.

Find him fast and make him sign a contract that he is working for you. Security companies would pay you as his agent a fortune to sign him as a contractor.

In any case what happened to you has probably to do with IP/.MAC reservation, or and, IP lease issues in the Router, and has nothing to do with braking into a system.

The bolded/underlined/italicized part... Or give me his info and I will be his agent...
 
Originally posted by: JackMDS
If you are using WPA2 and some else broke into your system it would the First time that a main street person broke WPA2.

Find him fast and make him sign a contract that he is working for you. Security companies would pay you as his agent a fortune to sign him as a contractor.

In any case what happened to you has probably to do with IP/.MAC reservation, or and, IP lease issues in the Router, and has nothing to do with braking into a system.

It's still breaking not braking 😉

 
Originally posted by: JackMDS
If you are using WPA2 and some else broke into your system it would the First time that a main street person broke WPA2.

Find him fast and make him sign a contract that he is working for you. Security companies would pay you as his agent a fortune to sign him as a contractor.

In any case what happened to you has probably to do with IP/.MAC reservation, or and, IP lease issues in the Router, and has nothing to do with braking into a system.

he coulda guessed the key in a PSK config. or dictionary'd it.
 
Download and install a free copy of Network Magic. It will tell you if you have an intruder on your network. Several other software packages do the same thing.

-Robert
 
Originally posted by: chess9
Download and install a free copy of Network Magic.

-Robert

Bad Idea NetMagic evantually would destroy the health of the network.

 
Originally posted by: JackMDS...IP/.MAC reservation, or and, IP lease issues in the Router, and has nothing to do with braking into a system.
Thanks, I will check into this and post back.

...also good to know that WPA is actually secure, I was under the impression that it was an easy process of watch, capture, crack and mimic to get onto a network (talking about packets and the info they contain).
 
From the weakest to the strongest, Wireless security capacity is.
No Security
MAC______(Band Aid if nothing else is available).
WEP64____(Easy, to "Break" by knowledgeable people).
WEP128___(A little Harder, but "Hackable" too).
WPA-PSK__(Very Hard to Break).
WPA-AES__(Not functionally Breakable)
WPA2____ (Not functionally Breakable).

Note 1: WPA-AES the the current entry level rendition of WPA2.

Note 2: If you use WinXP and did not updated it you would have to download the WPA2 patch from Microsoft. http://support.microsoft.com/kb/893357

The documentation of your Wireless devices (Wireless Router, and Wireless Computer's Card) should state the type of security that is available with your Wireless hardware.

All devices MUST be set to the same security level using the same pass phrase.

Therefore the security must be set according what ever is the best possible of one of the Wireless devices.

I.e. even if most of your system might be capable to be configured to the max. with WPA2, but one device is only capable to be configured to max . of WEP, to whole system must be configured to WEP.

If you need more good security and one device (like a Wireless card that can do WEP only) is holding better security for the whole Network, replace the device with a better one.

Setting Wireless Security - http://www.ezlan.net/Wireless_Security.html

The Core differences between WEP, WPA, and WPA2 - http://www.ezlan.net/wpa_wep.html
 
Back
Top