Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. Hacked

Hacked

Scheduled Pinned Locked Moved The Lounge
questioncomsysadminhardwaretools
14 Posts 10 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • C Offline
    C Offline
    Christopher Duncan
    wrote on last edited by
    #1

    Well, in addition to one physically dead LAN router, I also found that my wireless router had been hacked. Stupidly, I forgot to change the default admin password (I'm assuming that's how they found a way in), and the firewall had been set with several rules to block all TCP traffic on port 80, etc. Did a hardware / factory reset and it came back up with all but a couple of the firewall rules gone, and now it works as expected. Meanwhile, I've lost almost a full day to this network stuff. The good side of it is that I don't have to pay Hertz Rent-a-Geek when things go south. The bad news is that I'm the geek in charge, and thus here's a day of productivity I'll never get back.

    Christopher Duncan www.PracticalUSA.com Author of The Career Programmer and Unite the Tribes Got a career question? Ask the Attack Chihuahua!

    D 0 R J 4 Replies Last reply
    0
    • C Christopher Duncan

      Well, in addition to one physically dead LAN router, I also found that my wireless router had been hacked. Stupidly, I forgot to change the default admin password (I'm assuming that's how they found a way in), and the firewall had been set with several rules to block all TCP traffic on port 80, etc. Did a hardware / factory reset and it came back up with all but a couple of the firewall rules gone, and now it works as expected. Meanwhile, I've lost almost a full day to this network stuff. The good side of it is that I don't have to pay Hertz Rent-a-Geek when things go south. The bad news is that I'm the geek in charge, and thus here's a day of productivity I'll never get back.

      Christopher Duncan www.PracticalUSA.com Author of The Career Programmer and Unite the Tribes Got a career question? Ask the Attack Chihuahua!

      D Offline
      D Offline
      Douglas Troy
      wrote on last edited by
      #2

      Ummm... if your router was hacked, then they had access to your network. A better question now becomes: what did they get, and what have they installed on your machine that you don't know about ... I suggest you start scanning for trojans, virus and rootkits. Suggested tools: Malwarebytes System Internals Rootkit Revealer I'd also check user accounts and run netstat to see what ports are open and talking, and who they are talking to ... See ... this is why I run COMODO firewall pro on my machines as well, just in case.


      :..::. Douglas H. Troy ::..
      Bad Astronomy |VCF|wxWidgets|WTL

      C 1 Reply Last reply
      0
      • C Christopher Duncan

        Well, in addition to one physically dead LAN router, I also found that my wireless router had been hacked. Stupidly, I forgot to change the default admin password (I'm assuming that's how they found a way in), and the firewall had been set with several rules to block all TCP traffic on port 80, etc. Did a hardware / factory reset and it came back up with all but a couple of the firewall rules gone, and now it works as expected. Meanwhile, I've lost almost a full day to this network stuff. The good side of it is that I don't have to pay Hertz Rent-a-Geek when things go south. The bad news is that I'm the geek in charge, and thus here's a day of productivity I'll never get back.

        Christopher Duncan www.PracticalUSA.com Author of The Career Programmer and Unite the Tribes Got a career question? Ask the Attack Chihuahua!

        0 Offline
        0 Offline
        0x3c0
        wrote on last edited by
        #3

        Christopher Duncan wrote:

        I also found that my wireless router had been cracked

        FTFY Someone would have an interesting time trying to get into my router. It's got WPA2 encryption, with a password protected file-sharing switched on. I've changed all the default passwords and it doesn't broadcast itself. For those unaware of what they're doing, I've also set up MAC filtering et al. The only two vulnerabilities that I can think of is that the router isn't as protected as I would like it to be if someone had physical access to it, and that for the Wii to work I had to allow it to crank back the encryption to WPA if necessary Something you might be able to try, if you generally only move within a cone, is to use tin-foil to 'muffle' the signals in all but a few directions

        Between the idea And the reality Between the motion And the act Falls the Shadow

        R B 2 Replies Last reply
        0
        • 0 0x3c0

          Christopher Duncan wrote:

          I also found that my wireless router had been cracked

          FTFY Someone would have an interesting time trying to get into my router. It's got WPA2 encryption, with a password protected file-sharing switched on. I've changed all the default passwords and it doesn't broadcast itself. For those unaware of what they're doing, I've also set up MAC filtering et al. The only two vulnerabilities that I can think of is that the router isn't as protected as I would like it to be if someone had physical access to it, and that for the Wii to work I had to allow it to crank back the encryption to WPA if necessary Something you might be able to try, if you generally only move within a cone, is to use tin-foil to 'muffle' the signals in all but a few directions

          Between the idea And the reality Between the motion And the act Falls the Shadow

          R Offline
          R Offline
          realJSOP
          wrote on last edited by
          #4

          Hell, my wireless stuff is wide open (no encryption). There's no such thing as "secure wireless".

          "Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass..." - Dale Earnhardt, 1997
          -----
          "...the staggering layers of obscenity in your statement make it a work of art on so many levels." - Jason Jystad, 10/26/2001

          0 1 Reply Last reply
          0
          • C Christopher Duncan

            Well, in addition to one physically dead LAN router, I also found that my wireless router had been hacked. Stupidly, I forgot to change the default admin password (I'm assuming that's how they found a way in), and the firewall had been set with several rules to block all TCP traffic on port 80, etc. Did a hardware / factory reset and it came back up with all but a couple of the firewall rules gone, and now it works as expected. Meanwhile, I've lost almost a full day to this network stuff. The good side of it is that I don't have to pay Hertz Rent-a-Geek when things go south. The bad news is that I'm the geek in charge, and thus here's a day of productivity I'll never get back.

            Christopher Duncan www.PracticalUSA.com Author of The Career Programmer and Unite the Tribes Got a career question? Ask the Attack Chihuahua!

            R Offline
            R Offline
            Rama Krishna Vavilala
            wrote on last edited by
            #5

            Christopher Duncan wrote:

            ly, I forgot to change the default admin password

            You wont believe how many people leave it like that. At least in my neighborhood I made everyone put a WEP key and change the default password of their wireless routers. Thankfully, everyone got scared and did it when I explained to them that someone may do illegal things using their network if they leave it like that.

            1 Reply Last reply
            0
            • R realJSOP

              Hell, my wireless stuff is wide open (no encryption). There's no such thing as "secure wireless".

              "Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass..." - Dale Earnhardt, 1997
              -----
              "...the staggering layers of obscenity in your statement make it a work of art on so many levels." - Jason Jystad, 10/26/2001

              0 Offline
              0 Offline
              0x3c0
              wrote on last edited by
              #6

              Of course not. But I simply don't want people snooping around on my network, stealing bandwidth and my files. The more secure I can make it (at minimal expense to speed), the less likely that possibility is to occur. Do you share files across computers through wireless, or do you just use it to share Internet access?

              Between the idea And the reality Between the motion And the act Falls the Shadow

              C R 2 Replies Last reply
              0
              • C Christopher Duncan

                Well, in addition to one physically dead LAN router, I also found that my wireless router had been hacked. Stupidly, I forgot to change the default admin password (I'm assuming that's how they found a way in), and the firewall had been set with several rules to block all TCP traffic on port 80, etc. Did a hardware / factory reset and it came back up with all but a couple of the firewall rules gone, and now it works as expected. Meanwhile, I've lost almost a full day to this network stuff. The good side of it is that I don't have to pay Hertz Rent-a-Geek when things go south. The bad news is that I'm the geek in charge, and thus here's a day of productivity I'll never get back.

                Christopher Duncan www.PracticalUSA.com Author of The Career Programmer and Unite the Tribes Got a career question? Ask the Attack Chihuahua!

                J Offline
                J Offline
                jeffwask
                wrote on last edited by
                #7

                Lucky whoever was screwing around was being annoying rather than malicious.

                1 Reply Last reply
                0
                • D Douglas Troy

                  Ummm... if your router was hacked, then they had access to your network. A better question now becomes: what did they get, and what have they installed on your machine that you don't know about ... I suggest you start scanning for trojans, virus and rootkits. Suggested tools: Malwarebytes System Internals Rootkit Revealer I'd also check user accounts and run netstat to see what ports are open and talking, and who they are talking to ... See ... this is why I run COMODO firewall pro on my machines as well, just in case.


                  :..::. Douglas H. Troy ::..
                  Bad Astronomy |VCF|wxWidgets|WTL

                  C Offline
                  C Offline
                  Christopher Duncan
                  wrote on last edited by
                  #8

                  Yikes. Good point.

                  Christopher Duncan www.PracticalUSA.com Author of The Career Programmer and Unite the Tribes Got a career question? Ask the Attack Chihuahua!

                  1 Reply Last reply
                  0
                  • 0 0x3c0

                    Of course not. But I simply don't want people snooping around on my network, stealing bandwidth and my files. The more secure I can make it (at minimal expense to speed), the less likely that possibility is to occur. Do you share files across computers through wireless, or do you just use it to share Internet access?

                    Between the idea And the reality Between the motion And the act Falls the Shadow

                    C Offline
                    C Offline
                    CMTietgen
                    wrote on last edited by
                    #9

                    Not to mention that if it's wide open and some scumbag uses it access something like child porn, they could track it back to you and cause you some issues before it was determined who really accessed it.

                    1 Reply Last reply
                    0
                    • 0 0x3c0

                      Christopher Duncan wrote:

                      I also found that my wireless router had been cracked

                      FTFY Someone would have an interesting time trying to get into my router. It's got WPA2 encryption, with a password protected file-sharing switched on. I've changed all the default passwords and it doesn't broadcast itself. For those unaware of what they're doing, I've also set up MAC filtering et al. The only two vulnerabilities that I can think of is that the router isn't as protected as I would like it to be if someone had physical access to it, and that for the Wii to work I had to allow it to crank back the encryption to WPA if necessary Something you might be able to try, if you generally only move within a cone, is to use tin-foil to 'muffle' the signals in all but a few directions

                      Between the idea And the reality Between the motion And the act Falls the Shadow

                      B Offline
                      B Offline
                      bulg
                      wrote on last edited by
                      #10

                      you just won the tinfoil hat contest for this month

                      0 1 Reply Last reply
                      0
                      • 0 0x3c0

                        Of course not. But I simply don't want people snooping around on my network, stealing bandwidth and my files. The more secure I can make it (at minimal expense to speed), the less likely that possibility is to occur. Do you share files across computers through wireless, or do you just use it to share Internet access?

                        Between the idea And the reality Between the motion And the act Falls the Shadow

                        R Offline
                        R Offline
                        realJSOP
                        wrote on last edited by
                        #11

                        I use it as an access point into my wired internet connection from my laptop and my HTPC, and all traffic (in or out) goes through the locked down wired firewall (no traffic goes out unless the IP it's coming from is in the forwarding list). Everything else is wired. It's limited to the two mac addresses of the two machines that hit it. Beyond that, I'm broadcasting and not encrypting (not worth the bandwidth hit). Maybe one day I'll get one of those fancy "n" wireless routers and use encryption, but since my laptop ain't "n" compatible, I'm in no hurry.

                        "Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass..." - Dale Earnhardt, 1997
                        -----
                        "...the staggering layers of obscenity in your statement make it a work of art on so many levels." - Jason Jystad, 10/26/2001

                        R U 2 Replies Last reply
                        0
                        • R realJSOP

                          I use it as an access point into my wired internet connection from my laptop and my HTPC, and all traffic (in or out) goes through the locked down wired firewall (no traffic goes out unless the IP it's coming from is in the forwarding list). Everything else is wired. It's limited to the two mac addresses of the two machines that hit it. Beyond that, I'm broadcasting and not encrypting (not worth the bandwidth hit). Maybe one day I'll get one of those fancy "n" wireless routers and use encryption, but since my laptop ain't "n" compatible, I'm in no hurry.

                          "Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass..." - Dale Earnhardt, 1997
                          -----
                          "...the staggering layers of obscenity in your statement make it a work of art on so many levels." - Jason Jystad, 10/26/2001

                          R Offline
                          R Offline
                          Robert Surtees
                          wrote on last edited by
                          #12

                          I don't get too worked up about this sort of thing either and mac address filtering will generally keep the neighbors off your LAN, but for those of you thinking mac address filtering adds any security, think again. It's just a matter of sniffing packets for valid mac addresses and then spoofing them to gain access.

                          1 Reply Last reply
                          0
                          • R realJSOP

                            I use it as an access point into my wired internet connection from my laptop and my HTPC, and all traffic (in or out) goes through the locked down wired firewall (no traffic goes out unless the IP it's coming from is in the forwarding list). Everything else is wired. It's limited to the two mac addresses of the two machines that hit it. Beyond that, I'm broadcasting and not encrypting (not worth the bandwidth hit). Maybe one day I'll get one of those fancy "n" wireless routers and use encryption, but since my laptop ain't "n" compatible, I'm in no hurry.

                            "Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass..." - Dale Earnhardt, 1997
                            -----
                            "...the staggering layers of obscenity in your statement make it a work of art on so many levels." - Jason Jystad, 10/26/2001

                            U Offline
                            U Offline
                            UserNameless
                            wrote on last edited by
                            #13

                            why not buy a USB wireless card that can get "n" signals?

                            1 Reply Last reply
                            0
                            • B bulg

                              you just won the tinfoil hat contest for this month

                              0 Offline
                              0 Offline
                              0x3c0
                              wrote on last edited by
                              #14

                              Something I'm very proud of. It's not often you can put a tinfoil hat on a router. But mostly, I enabled the security stuff that was in the web interface. Now, if there was a way to stop the cats chewing the antenna...electric current it is

                              Between the idea And the reality Between the motion And the act Falls the Shadow

                              1 Reply Last reply
                              0
                              Reply
                              • Reply as topic
                              Log in to reply
                              • Oldest to Newest
                              • Newest to Oldest
                              • Most Votes


                              • Login

                              • Don't have an account? Register

                              • Login or register to search.
                              • First post
                                Last post
                              0
                              • Categories
                              • Recent
                              • Tags
                              • Popular
                              • World
                              • Users
                              • Groups