4K all the way

You probably don't NEED a 4K webcam, but we love Logitech's BRIO 4K anyway

Long live Windows phone

Contrary to popular belief, Windows phone won't die anytime soon

XP-YESSSSSSS

Dell's already awesome XPS 15 gets even better in 2017

Surface Pwn 5

Surface Pro 5, Project NEON details leaked on LinkedIn?

Redefining the PC

Why Microsoft's Surface phone could be MUCH more than a mere 'phone'

Surface table meets Windows 10

Yes, we did put Windows 10 on the original Surface table ... and it rocks

Cream o' the crop

Before buying a Microsoft laptop, check out our pick for the absolute best

Simple and secure, just the way I like it

We think Windows 10 Cloud is a great idea, here's why

uber micro

Halo Wars 2 has something for everyone. Here's our full review.

Oldie but goldie

We reviewed Microsoft's decade-old Surface table

Creators Update comin' at ya

These are the coolest new features in the next big Xbox One update (video)

Buyer's guide

The Razer Blade 14 is the best laptop Razer has to offer

Windows 10 app gems

10 terrific Windows 10 apps you should be using

Tower of power

Here's what we think of Dell's XPS Tower Special Edition

Quite a deal

Grab the complete C# coding bootcamp for $41!

Your go-to laptop guide

Introducing our ultimate laptop buyer's guide

Listen here

Attn Android and iPhone users: What you need to know about Windows phone

Old is new?

The original Surface Pro still holds its own in the 2-in-1 world

Xbox Greenlight?

No, internet, Microsoft isn't opening Xbox to all UWP games

Falling in love

HP Envy 34 review: An ultrawide curved all-in-one after my heart

< >
Welcome to the Windows Central Forums Create Your Account or Ask a Question Answers in 5 minutes - no registration required!
Page 2 of 2 FirstFirst 12
Results 26 to 34 of 34
Like Tree13Likes
  1. ImmortalWarrior's Avatar
    Member

    Posts
    523 Posts
    Global Posts
    524 Global Posts
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    #26  
    I used to work for a network security company that had their own monitoring servers monitoring the internal network as well as clients. I used to log into youtube and hotmail all the time knowing full well that they couldn't read my information from the network data. I knew it because I could see the exact same traffic from client networks and it was encrypted gibberish every time.
  2. gedzum's Avatar
    Member

    Posts
    1,972 Posts
    Global Posts
    1,992 Global Posts
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    #27  
    Thanks for the tips and info ImmortalWarrior, very useful for future reference. I saw an article on Ars Technica a couple of days ago about password cracking, I found it quite fascinating and also quite disturbing. The article can be found here: 25-GPU cluster cracks every standard Windows password in <6 hours | Ars Technica

    I don't know much about the subject, but like this thread, that article really struck a chord with me about what could potentially be out there. The comments section also has some interesting info.

    Quote Originally Posted by palandri View Post
    It really opened my eyes also. I even added French letters with accent marks to make it a little harder. I am also watching my network map and log closely.
    Nice idea I might have to try something like that also. I'm definitely going to incorporate symbols in more of my passwords.
    palandri likes this.
  3. nidO#WN's Avatar
    Member

    Posts
    11 Posts
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    #28  
    Just to add to the original query raised, bear in mind that it isn't just WPA network keys that can be cracked directly, but also (particularly with older or non-updated routers) pin-based WPS that can be breached which in turn provides the router's WPA key - the vulnerability of most routers' WPS pin was made public at the beginning of this year and a tool to do the job released (see: Hands-on: hacking WiFi Protected Setup with Reaver | Ars Technica or Tactical Network Solutions - News - Cracking WiFi Protected Setup with*Reaver).
    Most router manufactures subsequently released updates that gave the option of disabling pin-based WPS, in the case of a swathe of Linksys routers (particularly the popular E4200) this fix was included in the 1.0.0.4 firmware (which you've mentioned is what you were running) however crucially, if a neighbour cracked your WPS prior to you updating to 1.0.0.4 he will have had your network key the whole time, up until you changed it.
  4. Daniel Ratcliffe's Avatar
    Retired Moderator

    Posts
    3,046 Posts
    Global Posts
    4,703 Global Posts
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    #29  
    Quote Originally Posted by gedzum View Post
    Thanks for the tips and info ImmortalWarrior, very useful for future reference. I saw an article on Ars Technica a couple of days ago about password cracking, I found it quite fascinating and also quite disturbing. The article can be found here: 25-GPU cluster cracks every standard Windows password in <6 hours | Ars Technica

    I don't know much about the subject, but like this thread, that article really struck a chord with me about what could potentially be out there. The comments section also has some interesting info.



    Nice idea I might have to try something like that also. I'm definitely going to incorporate symbols in more of my passwords.
    And by 2015, you'll be able to crack a 3904309345980345690845690845609845689034690845643298432895 character length password featuring letter, numbers, and symbols, from all different character sets (including Unicode, Arabic, etc), in less than 1 nanosecond.
  5. beachhoppr's Avatar
    Member

    Posts
    332 Posts
    Global Posts
    473 Global Posts
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    #30  
    Allow me to move this thread forward and help everyone: https://www.grc.com/haystack.htm
  6. Allen Balkema's Avatar
    Member

    Posts
    34 Posts
    Global Posts
    36 Global Posts
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    #31  
    Quote Originally Posted by ImmortalWarrior View Post
    Hidden SSID does nothing to protect your network. It's the same level of protection provided by using a POST http request over a GET.

    Mac address filtering cam be spoofed in 2 seconds. I spoof all my hack attempts before I even touch the router. Valid MAC addresses are broadcast with the packets from those devices

    The only thing you can do is use a fairly long complex password. Make sure you do the same for your router login.
    im pretty sure this guy is Palandris neighbor and is trying to get him to give up so he wont have to keep hacking his wifi :P
    palandri likes this.
  7. jdevenberg's Avatar
    Member

    Posts
    1,037 Posts
    Global Posts
    1,057 Global Posts
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    #32  
    Quote Originally Posted by ImmortalWarrior View Post
    I used to work for a network security company that had their own monitoring servers monitoring the internal network as well as clients. I used to log into youtube and hotmail all the time knowing full well that they couldn't read my information from the network data. I knew it because I could see the exact same traffic from client networks and it was encrypted gibberish every time.
    Okay, I use Hotmail as well (well, outlook now). So if I go there to check my email (which is allowed), they can see I went to live.com, but can't see my email or any of the content?
  8. stmav's Avatar
    Retired Moderator

    Posts
    3,685 Posts
    Global Posts
    3,767 Global Posts
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    #33  
    The first thing I do when I set up my wireless router is change the default login and password. Then I change the default ip range to something different. I know it's not going to keep out super hackers but at least people with a little working knowledge to look for 192.168.x.x are deterred. I also make the password a sentence, but only use the first letter of each work in the sentence. The first letter is capitol following sentence structure and ends with a . ! ? depending on the sentence. Then sentence can make no sense what soever, but I find myself thinking it as I type in the letters and punctuation.
  9. ImmortalWarrior's Avatar
    Member

    Posts
    523 Posts
    Global Posts
    524 Global Posts
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    #34  
    Quote Originally Posted by stmav View Post
    The first thing I do when I set up my wireless router is change the default login and password. Then I change the default ip range to something different. I know it's not going to keep out super hackers but at least people with a little working knowledge to look for 192.168.x.x are deterred. I also make the password a sentence, but only use the first letter of each work in the sentence. The first letter is capitol following sentence structure and ends with a . ! ? depending on the sentence. Then sentence can make no sense what soever, but I find myself thinking it as I type in the letters and punctuation.
    Internal address range won't even deter a noob hacker. Internal ranges are defined by IANA. If they were used for security they wouldn't be defined.

    An internal range is used for NAT. It protects individual computers on your network from external machines making unauthorized connections. In reality, its far more complicated than that, but more details are irrelevant to the point.

    Your router, when a user cracks your WiFi code will give the user an address from the pool so long as DHCP is enabled. If it isn't, they will literally tell the router what ip it wants.

    At any point if the user isn't given an IP or the one it asks for is not within the subnet or already leased, they will be assigned a default IP by the OS. From here they can query the network adapter for the address and subnet mask of the gateway and bam, they know exactly the internal range you chose.
    stmav likes this.
Page 2 of 2 FirstFirst 12

Similar Threads

  1. Is it possible to factory reset your phone?
    By podsnap in forum Windows Phone 7
    Replies: 1
    Last Post: 10-07-2011, 04:14 AM

Posting Permissions

";