User Panel
Posted: 1/15/2006 12:01:40 AM EDT
Is it illegal to use them? Like in an apartment complex?
My son just hooked up his new computer and picked up about 4 open connections. |
|
|
|
|
Technically it is..... But, if he isnt hacking it and that person didnt secure it, go for it...
Just remember, its on there router. So they can see everything your doing.....(I.E. passwords) |
|
How can they see what he's doing? I have a wireless router and I can't see what my step son is doing (from what I know..Or can I? ) |
|
|
If their router has the default password set (likely if you they don't know how to secure their connection), then you can access it and clear the access logs. Linksys: 192.168.1.1 user: <blank> password:admin Netgear www.routerlogin.net user:admin password:password But don't use it, it's really screwed up. It will slow them down, especially if you download/upload something. Find a way to leave them a message that their shit is not secure. You can connect to their network and check "my network places". If they are sharing all the files on their hard drive, you can put a file that says READ ME WHOEVER THIS IS or something and tell them how to secure it. You can sometimes do a net send to them as well, which will cause a windows message to pop up. Do the right thing. |
|
|
|
||
|
Routers log all traffic....And it can see all your doing. Website, passwords and so on. But then again. If they knew what they were doing the connection would probably be secured. Unless they wanted to screw with people. |
||
|
How can I see what's on my router log? I want to see if my step son is looking at pron! |
|||
|
Just don't annoy anyone like yer doing now with stupid questions. RTFM.
|
|
Look at your manual, it will tell you about the logging information and how to read it. |
||||
|
You'll think twice once you see he's looking at the ghey pron! |
||||
|
|
||||
|
I love it. Experts popping out of the wall telling you to read the fucking manual, but you still can't find a godddamn lower control arm for an 84 K-car.
|
|
I didnt use the word "fucking" You need a new one or used one? |
|
|
I found it in the manual so poo on YOU! and my step son is looking at PS2 cheats and itunes which he can't download because he doesn't have an ipod...
|
|
baffled. |
|
|
See, you can really screw with his mind now.... |
|
|
OK..Why am I looking for one of those? |
|
|
What?!?!? No PRON? |
|
|
www.bash.org/?202477 |
|||
|
And illegal… up to a felony in some places and depending on what you do. |
|
|
So you want to see what your son is surfing on your WAP? No problem, use a program called driftnet. Runs on linux and can sniff all graphic images from their wireless stream as well as video streaming. If you have keys setup on WAP, you must configure driftnet the same way. We use this package in my line of work and it works. There is also another package called chaos reader that is a Perl script. It's a little more intelligent....DON'T get in trouble with these tools....Only use them in a legal way.
|
|
Awesonme tools their but...Do you really think this guy knows anything abut *nix? |
|
|
Ethereal - runs on windows and linux and captures all packets.
|
|
some states it is illegal (unless it is an obvious guest access)
other states it is okay but you cannot hack or be malicious BASICALLY - if you did not pay for it it is not yours to use! |
|
All is good. I spoke with him and told him what you guys said and told him he needed his own connection and he agreed. He's calling the cable company this week.
He's a good kid... |
|
We have had this thread before.
In some states it is considered illegally entering a computer system, just the same as hacking. In others it is not. ....BUT.... Anytime you use an unknown wireless connection, the router can easily be LOGGING all your traffic,,,, including websites you visit, and passwords and login names you use. So it is not wise to use unknown WAP's for anything but generic "surfing" (don't visit anywhere you had to "set an account" at). ~ |
|
How about using this a lesson to teach you son some honesty???????????????????????
|
|
In most places, at the very least, it would be considered theft of service.
|
|
You must first turn on the log. It isn't automatic. I have been known to turn on encryption and then set a misc. username and password on my dumb neighbor's wireless. (I used to leave mine wide open too in the early days, stupid me.) The annoying thing is my PC would often pick a router other than mine, regardless of default. |
||||
|
It depends on if you are stealing from the jar or the tray, the jar is Jerry's Kids..
There's nothing wrong with: 1. Having your WEP turned off so others can get "free" broadband on your dime unless the broadband provider says otherwise. All they can do is say,"No broadband for you!" They might have grounds to sue you for breach of contract and stuff, since you were running an unregistered commercial account. 2. Having your router security turned off so people can access your logs and stuff, it's not advisable though. You would have to reset your router a lot and clean your hard drive to get the illegal pr0n and stuff off.. It is wrong if you are accessing someone's unsecure router or using their Internet if they didn't say it was okay. It's even illegal if you're caught Warhacking and you can get arrested in some states but the victim usually has to report it during the act. Caveat emptor: The author might be an idiot. The author writes as if the "real" world and his imaginary world are the same. |
|
LMAO most people have |
|||
|
What you guys havent considered is that many people leave their connections open so other people can use them. You also have to set up your comp to allow access by others on your network...firewalls are your friends
|
|
If you want to do indepth packet analysis. Usually for the most hardcore hacker/cracker. Most beneficial is to run Cain&Abel. It will dynamically display the usernames and passwords and the protocol used to obtain them (http, SMTP, POP3, and even some Kerberos keys that can be broken with a rainbow table or reverse crack). I have even used it to man-in-the-middle SSL encrypted sessions so that I can capture usernames/passwords. If you are on the same network segment, you can capture any unencrypted username/password. If you capture the MAC of the router and target host, you can man-in-the-middle them. Of course, I do this as a CEH (whitehat) to test system security. |
|
|
no... is watching your neighbors TV threw his front window from the street stealing cable? keep your dam wifi out of my house and secured .. wanna have some fun with open wifis?... get on it, start a free email from yahoo, then start sending death threats to the ATF and gov. employees.. then set up a camera... |
||
|
Or order a few sex toys for them with their Amazon account... |
|||
|
Mine looks open from the outside, but I have a Cisco PIX firewall between the wireless network and the internet. Nothing but WEB and FTP are allowed and only using a username and password when on the straight wireless connection. I then have a server setup in the house that acts as a VPN server and router between the wireless network and my home wired network. Connect to that VPN and you are trusted like one of my home wired PCs and can surf till you drop.
This way it's easy for family/friends to connect to my wireless network, and the VPN connection is simple to make. However I don't have to endure WEP and it's slowdown of thoughput, remembering HEX keys and MAC addresses or any of that other crap. Anyone who gets on without a VPN connection is going nowhere. So that is how a geek sets up an 'open' wireless network. |
|
Use it all you like!!!!!!
However, if you get caught for something, whatever it may be, be sure to MAN UP and admit that you were using something that you didn't pay for -- don't try to punk out. Ok? |
|
Read 2 posts above yours. That's just what I did. All I asked if it was illegal.. General question. He's not using the open routers. I told him it was dishonest and stealing and to get his own. That is exactly what he's doing. |
|
|
Yeah its illegal, in general.
That said, I'm using one right now, named "linksys". I've also got a spoofed MAC address though, and nothing short of a hardware directional locator can tie me to that system - that I know of :0) |
|
Your just now noticing that? |
|
|
+1 At the very least 1. Change your default router name 2. Do NOT broadcast your SSID 3. Use MAC filtering |
||
|
Sign up for the ARFCOM weekly newsletter and be entered to win a free ARFCOM membership. One new winner* is announced every week!
You will receive an email every Friday morning featuring the latest chatter from the hottest topics, breaking news surrounding legislation, as well as exclusive deals only available to ARFCOM email subscribers.
AR15.COM is the world's largest firearm community and is a gathering place for firearm enthusiasts of all types.
From hunters and military members, to competition shooters and general firearm enthusiasts, we welcome anyone who values and respects the way of the firearm.
Subscribe to our monthly Newsletter to receive firearm news, product discounts from your favorite Industry Partners, and more.
Copyright © 1996-2024 AR15.COM LLC. All Rights Reserved.
Any use of this content without express written consent is prohibited.
AR15.Com reserves the right to overwrite or replace any affiliate, commercial, or monetizable links, posted by users, with our own.