How to identify the person, Who is using your WiFi and stop it?

The connection is slower than usual, too slow to cause either a failure of your carrier. You control the settings, do a few tests ... a moment: is it possible that the neighbor is connected to your wireless router and use the connection to download movies to piece? Yes.
WiFi networks are particularly vulnerable to hackers. If your signal has no encryption, or you forgot to activate it or you want to share with everyone (in this case, only of interest to drive the bullies). But even with encryption, it is possible that someone in through the most diverse reasons.
This tutorial will teach you to identify intruders on your network and take steps to expel them altogether. By the way, we will use to let you know what protections are effective and which, by contrast, only a waste of time.

Wireless intruder detection

There are several symptoms that indicate the presence of an intruder in a home WiFi network. With all your computers and devices powered off or disconnected from the network, see the activity lights on the router: a continued rapid flicker indicates that devices are connected and transmitting a large flow of information.
BASP speed measurement
A speed meter helps to confirm the loss of bandwidth
The intrusion, if the neighbor misbehaves, will also affect the download speed you are comfortable. A user of MegaUpload, for example, may suddenly find the IP blocked by a discharge which is made from your router. but not from your computer. The sense of loss of bandwidth is difficult to quantify: programs such as BASP or NetWorx will help to confirm it.
AirSnare just found several "outsiders" (unknown devices)
There are tools designed to hunt intruders. The first and best known is AirSnare , which has not been updated in a few years, but still works on many machines without problems. AirSnare hear the traffic passing through the network adapter to get all the MAC addresses connected to the network. A similar utility, but command line is the interesting Fing 
The simple-but effective-Zamzom Wireless Network Tool
Wireless Zamzon does the same, but lacks all AirSnare options, such as sending messages or event log. AirSnare also emits beeps every time you discover an unknown direction. Want to be absolutely sure that what you found is an intruder? Sometimes, you try to access shared resources on your computer can take away the doubts of others. Go to Start> Run and type \ \ followed by the IP detected. Be good!
If the intruder does not have firewalls and shared folders, this will be fun
Finally, if you have left the router control panel, open it by typing the address or in your browser, enter username and password (if you do not know, find out your device in or CIRT ) and navigate to a menu called "Wireless Clients", "Connected Clients" or similar. You'll recognize him by a table that shows local IP addresses and MAC addresses. Note that each device you have at home (like consoles) will have its own IP.
Wireless Clients
Well, there are no intruders. I can sleep peacefully.
The latter system consists in playing all the bells in the neighborhood, go into the house and examine the computer to find the suspect. An impractical approach ...

Raise defenses: what works and what does not

You have proven that someone broke into your wireless network without difficulty now is the time to reinforce the walls and plug holes so that will not happen again. There are a few things that do not work and therefore, you should avoid when securing the network.

Useless measures:

  • WEP encryption: it is well known that this type of encryption is obsolete. The main reason for which is still used is compatible with 802.11b adapters, and is perhaps why many ISPs enabled by default. What are unsure why? Every mother's son knows how to use minimally hustler Aircrack , a program capable of finding key WEP shortly. 
  • MAC filtering: restrict browsing to the MAC addresses of your computers is tempting, but useless. With the directions identified by the intruder and utilities such as MacMakeUp , changing the device address, the mac-spoofing is done in seconds. What might happen is that you stay out of your network.
  • Hide your SSID: Hide the name of the wireless network is like walking behind a door and pretend that no one sees you. Itself is interesting, moreover, to rename the SSID to something that is not like the default name or may be related to your location. Try something nice like "GTFO" or "HolaPollo."
  • Turn off the router: it is true, a router is a router off intrusion-proof ... and also a useless piece of junk. Turn off the router during periods of inactivity to save power is good and little else.
Are they completely useless these security measures? Depends on the skill level of your neighbors. Using Aircrack or similar programs is not as widespread in certain districts, it is unlikely, for example, that a kind old lady use to save a few quarters, but stranger things have happened. WEP, hide the SSID and MAC address filtering only prevent casual connections who seeks open networks.

What works:

  • WPA/WPA2 encryption: encryption technology WPA compatible with 802.11g adapters above, is much stronger than WEP. Any router has WPA-PSK, instead of a hexadecimal code, is a long passphrase variable (which must be resistant to dictionary attacks .) Do you have WPA2-AES? Is the most robust.
  • Change the password of the router: it is the first thing to do. The hypothetical intruder will want to open ports on the router to use your favorite P2P program or hide their movements. Change the password of the router to have the last word on the connection.
  • Paint Anti-WiFi: a novel solution is to cover the walls of your flat with a layer of special paint that prevents the passage of WiFi signals. Too bad that is not on sale yet ...

What if I leave it open?

Are you a generous person? Leave the router open-with the admin password changed "is a great way to win friends, though there are many reasons why it is not recommended, as loss of speed (caused by who discharge data to lock) or the use of connection for illegal purposes (whatever). An interesting way to share and take advantage of your connection is to create a FON Spot .
If you choose to share the connection, be sure to use a sophisticated router that gives you full control over the network. Some models run their own version of Linux. An example of the fancy stuff that can get done what gives Upside-Down-Ternet , a method for navigating the intruder, yes, but with the images in reverse. Is not it fun? Another interesting idea is to configure a home page with NoCatSplash to greet visitors.


Post a Comment