473,545 Members | 2,469 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

wireless trap

dlite922
1,584 Recognized Expert Top Contributor
I want to create a blackhole wireless internet at my house so that neighbors can connect but it won't be connected to anything, just my own hacking sandbox and a modem.

I'm going to just leave it wide open, no encryption, call it 'linksys' and default IP

What's a good tool to log the computers that connect? to see who is stealing my internet?

or automatically give them a virus(even though it will be a shitty one that almost all anti-viruses will block)

do worms travel without any "trigger"?

I'm open for discussion on this, pour out your criticisms and thoughts, or helpful links

Thanks,



Dan

EDIT: My intention is not malicious. I do not want to cause any inconvenience to anybody. I'm partly just playing around with network security (my field of study) and partly want to reduce internet leeches in my neighborhood.
Dec 4 '09 #1
3 2398
sicarie
4,677 Recognized Expert Moderator Specialist
Dan,

It's illegal to deliberately infect someone with a virus or malware, so I'm not going to touch that.

As for the 'blackhole' internet, are you looking to create more than one wireless LAN with the same router? If you have an extra wireless router, you can just hook that directly to your sandbox (and not to the internet), and do whatever testing you want to do there.

If you were going to connect it to the internet there are several entertaining things you can do as long is it's your connection - like point to a proxy that inverts all data coming into the computer (so web pages are mirrored correctly, just with everything backwards).

I'd recommend the first - leaving it connected to a sandbox with no internet because you are still liable for what they may do over your connection, especially if you deliberately left it unsecured.

Did that answer all your questions?

sicarie

::Update::
If you know people are connecting to it illegally, you can monitor the logs to find the MAC address and IP and do netsend messages, block their MAC, or sniff their traffic until they send something that shows who they are, and then go to their house and demand they stop.
Dec 4 '09 #2
hsriat
1,654 Recognized Expert Top Contributor
Hi Dan,

I believe if you want to do more than just playing around, you can actually hack all their web passwords (even the ones for https sites) by doing a sophisticated 'dan'-in-the-middle attack.

Regards
Dec 8 '09 #3
RedSon
5,000 Recognized Expert Expert
Gentlemen,

There will be no further discussion about hacking, cracking, attacking, or snacking on anyone's computer.

However since you are legally allowed to administer your network however you see fit we can discuss how you can monitor traffic on your own router. This will be quite a project if you are interested in doing it properly. However if you just want a simple solution you can look up tools like Snort, Wireshark, Honeypots, and Kismet.

Keep in mind that this thread is walking a fine line between what you are allowed to do on your own hardware and network, versus what you are allowed to do on another person's computer or your ISPs network which you rent from them. Let's make sure we are on the right side of the line...
Dec 8 '09 #4

Sign in to post your reply or Sign up for a free account.

Similar topics

0
2160
by: Steve Chen | last post by:
Wireless Search with Summarized Results/Web Pages, powered by Google! We just released a wireless search service. The wireless search service takes the results returned by Google and gives key points of the resulting web sites. The short key points are suitable for viewing on wireless devices. Check it out at: <a...
2
3949
by: happymeteor | last post by:
Hi, everyone! I've tried to make a program which can get the wireless signal strength of wireless NIC(ex. 802.11b network card). As I know, regardless of whatever vender's NIC is used, in the property window of wireless network card, we can see the wireless signal strength state. (antenna 0-5) How can I get this information?
8
2051
by: Debbie | last post by:
Thank you for any help you can give me. I have a database that I've been working on... a backend for the server and front ends for the users. Now I've found out that the network is wireless and that wireless & Access don't get along... I have been reading what I could find in this group... but I would like to clarify. The users have Windows...
4
1754
by: Al | last post by:
Hi, Although my application perform nicely in wired network, the performance in wireless network is very bad (I have tested in 802.11b). Would appreciate if anyone could suggest how I can improve the performance in the wireless network. Any one has tried running application in 802.11b vs 802.11g? I am developing it using vb.net, ado.net and SQL...
45
3008
by: Arno R | last post by:
Hi all, I am about to distribute an A97-runtime app. which will be used on a LAN by approx. 30 users. The network is pretty good, but there are a few managers who have wireless laptops... Of course they also want to access the db. I am a bit afraid of possible corruption due to the wireless connections. ==> Do I have to be afraid indeed?...
1
1656
by: =?Utf-8?B?QmVmdWRkbGVkLTE=?= | last post by:
Trying to set up a WGA54G (gaming adapter) to a WRT54G(wireless router) so I am able to use a wireless service provider on an already established wired/wireless office network. Thoughts???
7
3627
by: ixeye | last post by:
Anybody else ever had a problem like this? Windows 2003 Domain with 180 machines, 21 of them with XP SP2 Laptop Wireless access to the domain, on three different WIFI AP. Randomly (and luckily infrequently) I am "losing" my dhcp on wireless machines where they will "drop" off the network suddenly and then not reconnect even rebooting, yet...
1
3189
by: Nefrit | last post by:
OK this is my situation: This coming Friday I will be getting Telewest broadband installed in my house, along with my PC there are 3 other PC's and 1 Laptop, making a total of 5 all using Windows. We are hoping to set up a wired/wireless network after the broadband arrives so we can all use the internet at the same time (the broadband...
4
4125
by: Pancakes | last post by:
Hello all, this is my first post in these forums, so bear with me if I've broken a few rules here or there. Anyhow, I would like to ask if anyone if familiar with the XBee Pro, here, and documentation is available here. The documents don't match the product exactly, the links from the product page ended up to the documents page I supplied. ...
0
7935
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that...
1
7449
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For...
0
7780
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the...
0
6009
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then...
0
5069
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert...
0
3479
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in...
0
3465
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
1
1911
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
0
734
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.