Hacked
-
Well, in addition to one physically dead LAN router, I also found that my wireless router had been hacked. Stupidly, I forgot to change the default admin password (I'm assuming that's how they found a way in), and the firewall had been set with several rules to block all TCP traffic on port 80, etc. Did a hardware / factory reset and it came back up with all but a couple of the firewall rules gone, and now it works as expected. Meanwhile, I've lost almost a full day to this network stuff. The good side of it is that I don't have to pay Hertz Rent-a-Geek when things go south. The bad news is that I'm the geek in charge, and thus here's a day of productivity I'll never get back.
Christopher Duncan www.PracticalUSA.com Author of The Career Programmer and Unite the Tribes Got a career question? Ask the Attack Chihuahua!
-
Well, in addition to one physically dead LAN router, I also found that my wireless router had been hacked. Stupidly, I forgot to change the default admin password (I'm assuming that's how they found a way in), and the firewall had been set with several rules to block all TCP traffic on port 80, etc. Did a hardware / factory reset and it came back up with all but a couple of the firewall rules gone, and now it works as expected. Meanwhile, I've lost almost a full day to this network stuff. The good side of it is that I don't have to pay Hertz Rent-a-Geek when things go south. The bad news is that I'm the geek in charge, and thus here's a day of productivity I'll never get back.
Christopher Duncan www.PracticalUSA.com Author of The Career Programmer and Unite the Tribes Got a career question? Ask the Attack Chihuahua!
Ummm... if your router was hacked, then they had access to your network. A better question now becomes: what did they get, and what have they installed on your machine that you don't know about ... I suggest you start scanning for trojans, virus and rootkits. Suggested tools: Malwarebytes System Internals Rootkit Revealer I'd also check user accounts and run netstat to see what ports are open and talking, and who they are talking to ... See ... this is why I run COMODO firewall pro on my machines as well, just in case.
:..::. Douglas H. Troy ::..
Bad Astronomy |VCF|wxWidgets|WTL -
Well, in addition to one physically dead LAN router, I also found that my wireless router had been hacked. Stupidly, I forgot to change the default admin password (I'm assuming that's how they found a way in), and the firewall had been set with several rules to block all TCP traffic on port 80, etc. Did a hardware / factory reset and it came back up with all but a couple of the firewall rules gone, and now it works as expected. Meanwhile, I've lost almost a full day to this network stuff. The good side of it is that I don't have to pay Hertz Rent-a-Geek when things go south. The bad news is that I'm the geek in charge, and thus here's a day of productivity I'll never get back.
Christopher Duncan www.PracticalUSA.com Author of The Career Programmer and Unite the Tribes Got a career question? Ask the Attack Chihuahua!
Christopher Duncan wrote:
I also found that my wireless router had been cracked
FTFY Someone would have an interesting time trying to get into my router. It's got WPA2 encryption, with a password protected file-sharing switched on. I've changed all the default passwords and it doesn't broadcast itself. For those unaware of what they're doing, I've also set up MAC filtering et al. The only two vulnerabilities that I can think of is that the router isn't as protected as I would like it to be if someone had physical access to it, and that for the Wii to work I had to allow it to crank back the encryption to WPA if necessary Something you might be able to try, if you generally only move within a cone, is to use tin-foil to 'muffle' the signals in all but a few directions
Between the idea And the reality Between the motion And the act Falls the Shadow
-
Christopher Duncan wrote:
I also found that my wireless router had been cracked
FTFY Someone would have an interesting time trying to get into my router. It's got WPA2 encryption, with a password protected file-sharing switched on. I've changed all the default passwords and it doesn't broadcast itself. For those unaware of what they're doing, I've also set up MAC filtering et al. The only two vulnerabilities that I can think of is that the router isn't as protected as I would like it to be if someone had physical access to it, and that for the Wii to work I had to allow it to crank back the encryption to WPA if necessary Something you might be able to try, if you generally only move within a cone, is to use tin-foil to 'muffle' the signals in all but a few directions
Between the idea And the reality Between the motion And the act Falls the Shadow
Hell, my wireless stuff is wide open (no encryption). There's no such thing as "secure wireless".
"Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass..." - Dale Earnhardt, 1997
-----
"...the staggering layers of obscenity in your statement make it a work of art on so many levels." - Jason Jystad, 10/26/2001 -
Well, in addition to one physically dead LAN router, I also found that my wireless router had been hacked. Stupidly, I forgot to change the default admin password (I'm assuming that's how they found a way in), and the firewall had been set with several rules to block all TCP traffic on port 80, etc. Did a hardware / factory reset and it came back up with all but a couple of the firewall rules gone, and now it works as expected. Meanwhile, I've lost almost a full day to this network stuff. The good side of it is that I don't have to pay Hertz Rent-a-Geek when things go south. The bad news is that I'm the geek in charge, and thus here's a day of productivity I'll never get back.
Christopher Duncan www.PracticalUSA.com Author of The Career Programmer and Unite the Tribes Got a career question? Ask the Attack Chihuahua!
Christopher Duncan wrote:
ly, I forgot to change the default admin password
You wont believe how many people leave it like that. At least in my neighborhood I made everyone put a WEP key and change the default password of their wireless routers. Thankfully, everyone got scared and did it when I explained to them that someone may do illegal things using their network if they leave it like that.
-
Hell, my wireless stuff is wide open (no encryption). There's no such thing as "secure wireless".
"Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass..." - Dale Earnhardt, 1997
-----
"...the staggering layers of obscenity in your statement make it a work of art on so many levels." - Jason Jystad, 10/26/2001Of course not. But I simply don't want people snooping around on my network, stealing bandwidth and my files. The more secure I can make it (at minimal expense to speed), the less likely that possibility is to occur. Do you share files across computers through wireless, or do you just use it to share Internet access?
Between the idea And the reality Between the motion And the act Falls the Shadow
-
Well, in addition to one physically dead LAN router, I also found that my wireless router had been hacked. Stupidly, I forgot to change the default admin password (I'm assuming that's how they found a way in), and the firewall had been set with several rules to block all TCP traffic on port 80, etc. Did a hardware / factory reset and it came back up with all but a couple of the firewall rules gone, and now it works as expected. Meanwhile, I've lost almost a full day to this network stuff. The good side of it is that I don't have to pay Hertz Rent-a-Geek when things go south. The bad news is that I'm the geek in charge, and thus here's a day of productivity I'll never get back.
Christopher Duncan www.PracticalUSA.com Author of The Career Programmer and Unite the Tribes Got a career question? Ask the Attack Chihuahua!
-
Ummm... if your router was hacked, then they had access to your network. A better question now becomes: what did they get, and what have they installed on your machine that you don't know about ... I suggest you start scanning for trojans, virus and rootkits. Suggested tools: Malwarebytes System Internals Rootkit Revealer I'd also check user accounts and run netstat to see what ports are open and talking, and who they are talking to ... See ... this is why I run COMODO firewall pro on my machines as well, just in case.
:..::. Douglas H. Troy ::..
Bad Astronomy |VCF|wxWidgets|WTLYikes. Good point.
Christopher Duncan www.PracticalUSA.com Author of The Career Programmer and Unite the Tribes Got a career question? Ask the Attack Chihuahua!
-
Of course not. But I simply don't want people snooping around on my network, stealing bandwidth and my files. The more secure I can make it (at minimal expense to speed), the less likely that possibility is to occur. Do you share files across computers through wireless, or do you just use it to share Internet access?
Between the idea And the reality Between the motion And the act Falls the Shadow
-
Christopher Duncan wrote:
I also found that my wireless router had been cracked
FTFY Someone would have an interesting time trying to get into my router. It's got WPA2 encryption, with a password protected file-sharing switched on. I've changed all the default passwords and it doesn't broadcast itself. For those unaware of what they're doing, I've also set up MAC filtering et al. The only two vulnerabilities that I can think of is that the router isn't as protected as I would like it to be if someone had physical access to it, and that for the Wii to work I had to allow it to crank back the encryption to WPA if necessary Something you might be able to try, if you generally only move within a cone, is to use tin-foil to 'muffle' the signals in all but a few directions
Between the idea And the reality Between the motion And the act Falls the Shadow
-
Of course not. But I simply don't want people snooping around on my network, stealing bandwidth and my files. The more secure I can make it (at minimal expense to speed), the less likely that possibility is to occur. Do you share files across computers through wireless, or do you just use it to share Internet access?
Between the idea And the reality Between the motion And the act Falls the Shadow
I use it as an access point into my wired internet connection from my laptop and my HTPC, and all traffic (in or out) goes through the locked down wired firewall (no traffic goes out unless the IP it's coming from is in the forwarding list). Everything else is wired. It's limited to the two mac addresses of the two machines that hit it. Beyond that, I'm broadcasting and not encrypting (not worth the bandwidth hit). Maybe one day I'll get one of those fancy "n" wireless routers and use encryption, but since my laptop ain't "n" compatible, I'm in no hurry.
"Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass..." - Dale Earnhardt, 1997
-----
"...the staggering layers of obscenity in your statement make it a work of art on so many levels." - Jason Jystad, 10/26/2001 -
I use it as an access point into my wired internet connection from my laptop and my HTPC, and all traffic (in or out) goes through the locked down wired firewall (no traffic goes out unless the IP it's coming from is in the forwarding list). Everything else is wired. It's limited to the two mac addresses of the two machines that hit it. Beyond that, I'm broadcasting and not encrypting (not worth the bandwidth hit). Maybe one day I'll get one of those fancy "n" wireless routers and use encryption, but since my laptop ain't "n" compatible, I'm in no hurry.
"Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass..." - Dale Earnhardt, 1997
-----
"...the staggering layers of obscenity in your statement make it a work of art on so many levels." - Jason Jystad, 10/26/2001I don't get too worked up about this sort of thing either and mac address filtering will generally keep the neighbors off your LAN, but for those of you thinking mac address filtering adds any security, think again. It's just a matter of sniffing packets for valid mac addresses and then spoofing them to gain access.
-
I use it as an access point into my wired internet connection from my laptop and my HTPC, and all traffic (in or out) goes through the locked down wired firewall (no traffic goes out unless the IP it's coming from is in the forwarding list). Everything else is wired. It's limited to the two mac addresses of the two machines that hit it. Beyond that, I'm broadcasting and not encrypting (not worth the bandwidth hit). Maybe one day I'll get one of those fancy "n" wireless routers and use encryption, but since my laptop ain't "n" compatible, I'm in no hurry.
"Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass..." - Dale Earnhardt, 1997
-----
"...the staggering layers of obscenity in your statement make it a work of art on so many levels." - Jason Jystad, 10/26/2001why not buy a USB wireless card that can get "n" signals?
-
Something I'm very proud of. It's not often you can put a tinfoil hat on a router. But mostly, I enabled the security stuff that was in the web interface. Now, if there was a way to stop the cats chewing the antenna...electric current it is
Between the idea And the reality Between the motion And the act Falls the Shadow