12-20-2012, 05:38 PM #26
- 524 Posts
I used to work for a network security company that had their own monitoring servers monitoring the internal network as well as clients. I used to log into youtube and hotmail all the time knowing full well that they couldn't read my information from the network data. I knew it because I could see the exact same traffic from client networks and it was encrypted gibberish every time.
12-21-2012, 05:57 AM #27
- 1,839 Posts
Thanks for the tips and info ImmortalWarrior, very useful for future reference. I saw an article on Ars Technica a couple of days ago about password cracking, I found it quite fascinating and also quite disturbing. The article can be found here: 25-GPU cluster cracks every standard Windows password in <6 hours | Ars Technica
I don't know much about the subject, but like this thread, that article really struck a chord with me about what could potentially be out there. The comments section also has some interesting info.
12-21-2012, 06:27 AM #28
- 11 Posts
Just to add to the original query raised, bear in mind that it isn't just WPA network keys that can be cracked directly, but also (particularly with older or non-updated routers) pin-based WPS that can be breached which in turn provides the router's WPA key - the vulnerability of most routers' WPS pin was made public at the beginning of this year and a tool to do the job released (see: Hands-on: hacking WiFi Protected Setup with Reaver | Ars Technica or Tactical Network Solutions - News - Cracking WiFi Protected Setup with*Reaver).
Most router manufactures subsequently released updates that gave the option of disabling pin-based WPS, in the case of a swathe of Linksys routers (particularly the popular E4200) this fix was included in the 184.108.40.206 firmware (which you've mentioned is what you were running) however crucially, if a neighbour cracked your WPS prior to you updating to 220.127.116.11 he will have had your network key the whole time, up until you changed it.
- 12-21-2012, 06:28 AM #29
- 12-22-2012, 01:53 AM #32
- 12-22-2012, 05:29 PM #33
The first thing I do when I set up my wireless router is change the default login and password. Then I change the default ip range to something different. I know it's not going to keep out super hackers but at least people with a little working knowledge to look for 192.168.x.x are deterred. I also make the password a sentence, but only use the first letter of each work in the sentence. The first letter is capitol following sentence structure and ends with a . ! ? depending on the sentence. Then sentence can make no sense what soever, but I find myself thinking it as I type in the letters and punctuation.
12-23-2012, 06:28 PM #34
- 524 Posts
An internal range is used for NAT. It protects individual computers on your network from external machines making unauthorized connections. In reality, its far more complicated than that, but more details are irrelevant to the point.
Your router, when a user cracks your WiFi code will give the user an address from the pool so long as DHCP is enabled. If it isn't, they will literally tell the router what ip it wants.
At any point if the user isn't given an IP or the one it asks for is not within the subnet or already leased, they will be assigned a default IP by the OS. From here they can query the network adapter for the address and subnet mask of the gateway and bam, they know exactly the internal range you chose.
- By podsnap in forum Windows Phone 7Replies: 1Last Post: 10-07-2011, 04:14 AM