473,385 Members | 1,359 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,385 software developers and data experts.

wireless trap

dlite922
1,584 Expert 1GB
I want to create a blackhole wireless internet at my house so that neighbors can connect but it won't be connected to anything, just my own hacking sandbox and a modem.

I'm going to just leave it wide open, no encryption, call it 'linksys' and default IP

What's a good tool to log the computers that connect? to see who is stealing my internet?

or automatically give them a virus(even though it will be a shitty one that almost all anti-viruses will block)

do worms travel without any "trigger"?

I'm open for discussion on this, pour out your criticisms and thoughts, or helpful links

Thanks,



Dan

EDIT: My intention is not malicious. I do not want to cause any inconvenience to anybody. I'm partly just playing around with network security (my field of study) and partly want to reduce internet leeches in my neighborhood.
Dec 4 '09 #1
3 2391
sicarie
4,677 Expert Mod 4TB
Dan,

It's illegal to deliberately infect someone with a virus or malware, so I'm not going to touch that.

As for the 'blackhole' internet, are you looking to create more than one wireless LAN with the same router? If you have an extra wireless router, you can just hook that directly to your sandbox (and not to the internet), and do whatever testing you want to do there.

If you were going to connect it to the internet there are several entertaining things you can do as long is it's your connection - like point to a proxy that inverts all data coming into the computer (so web pages are mirrored correctly, just with everything backwards).

I'd recommend the first - leaving it connected to a sandbox with no internet because you are still liable for what they may do over your connection, especially if you deliberately left it unsecured.

Did that answer all your questions?

sicarie

::Update::
If you know people are connecting to it illegally, you can monitor the logs to find the MAC address and IP and do netsend messages, block their MAC, or sniff their traffic until they send something that shows who they are, and then go to their house and demand they stop.
Dec 4 '09 #2
hsriat
1,654 Expert 1GB
Hi Dan,

I believe if you want to do more than just playing around, you can actually hack all their web passwords (even the ones for https sites) by doing a sophisticated 'dan'-in-the-middle attack.

Regards
Dec 8 '09 #3
RedSon
5,000 Expert 4TB
Gentlemen,

There will be no further discussion about hacking, cracking, attacking, or snacking on anyone's computer.

However since you are legally allowed to administer your network however you see fit we can discuss how you can monitor traffic on your own router. This will be quite a project if you are interested in doing it properly. However if you just want a simple solution you can look up tools like Snort, Wireshark, Honeypots, and Kismet.

Keep in mind that this thread is walking a fine line between what you are allowed to do on your own hardware and network, versus what you are allowed to do on another person's computer or your ISPs network which you rent from them. Let's make sure we are on the right side of the line...
Dec 8 '09 #4

Sign in to post your reply or Sign up for a free account.

Similar topics

0
by: Steve Chen | last post by:
Wireless Search with Summarized Results/Web Pages, powered by Google! We just released a wireless search service. The wireless search service takes the results returned by Google and gives key...
2
by: happymeteor | last post by:
Hi, everyone! I've tried to make a program which can get the wireless signal strength of wireless NIC(ex. 802.11b network card). As I know, regardless of whatever vender's NIC is used, in the...
8
by: Debbie | last post by:
Thank you for any help you can give me. I have a database that I've been working on... a backend for the server and front ends for the users. Now I've found out that the network is wireless and...
4
by: Al | last post by:
Hi, Although my application perform nicely in wired network, the performance in wireless network is very bad (I have tested in 802.11b). Would appreciate if anyone could suggest how I can improve...
45
by: Arno R | last post by:
Hi all, I am about to distribute an A97-runtime app. which will be used on a LAN by approx. 30 users. The network is pretty good, but there are a few managers who have wireless laptops... Of...
1
by: =?Utf-8?B?QmVmdWRkbGVkLTE=?= | last post by:
Trying to set up a WGA54G (gaming adapter) to a WRT54G(wireless router) so I am able to use a wireless service provider on an already established wired/wireless office network. Thoughts???
7
by: ixeye | last post by:
Anybody else ever had a problem like this? Windows 2003 Domain with 180 machines, 21 of them with XP SP2 Laptop Wireless access to the domain, on three different WIFI AP. Randomly (and luckily...
1
by: Nefrit | last post by:
OK this is my situation: This coming Friday I will be getting Telewest broadband installed in my house, along with my PC there are 3 other PC's and 1 Laptop, making a total of 5 all using Windows....
4
by: Pancakes | last post by:
Hello all, this is my first post in these forums, so bear with me if I've broken a few rules here or there. Anyhow, I would like to ask if anyone if familiar with the XBee Pro, here, and...
0
by: Faith0G | last post by:
I am starting a new it consulting business and it's been a while since I setup a new website. Is wordpress still the best web based software for hosting a 5 page website? The webpages will be...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 3 Apr 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome former...
0
by: taylorcarr | last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
0
by: aa123db | last post by:
Variable and constants Use var or let for variables and const fror constants. Var foo ='bar'; Let foo ='bar';const baz ='bar'; Functions function $name$ ($parameters$) { } ...
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.