Jump to content

hapster

Active Members
  • Posts

    25
  • Joined

  • Last visited

Posts posted by hapster

  1. Hello. I've recently acquired a wireless router and plan to extend the signal of my network to other places in the vicinity. I was wondering if it was possible to do this extension using a wireless access point. If so, how should I configure both devices so that the router is the one hooked with the modem and the access point connects to the network created by the wireless router and extends the signal?

    *I'm using Ubuntu to configure my wireless devices.

    Thanks in advance.:)

  2. That is very possible. Yahoo! and RapidShare 'try' to use some sort of encryption when handing out cookies, however both algos have been broken so you have tools to read them. It would help if you could tell us the site where that cookie is coming from.

    I see. It also seems all sites I try to visit and sniff packets from my own machine are encrypted. I can't even see html content in plain text. Does this mean the demos done here in this show such as the pineapple router are already rendered useless? Or is it just me and my machine's settings that causes me not to see html data from the packets that I sniff from my machine.XD ?

  3. Hello. I've been playing around with wireshark and arpspoof for some time now and I've seen some packets with cookies in them however, these cookies don't seem to be in plain text.

    For example, a packet contained this cookie:

    userinfo=a%3A8%3A%7Bs%3A8%3A%22 ...

    and so on...

    Does this mean that the cookies are encrypted? Seems like hash to me.. Can I still make use of this information?

  4. lol well the main thing that pissed me off was the endless amounts of writing to pass the module. I can understand that these days most people lack common sense.

    oh that. I thought you got pissed by my question of it being client mode.XD I apologize. haha. Yeah...you're very right about that. What's even more sad is that they're mostly the big decision makers...lol

    Well that's just it for me its more the learning factor, sometimes the best way to learn something is by breaking it then fixing it.

    Hacker culture is so twisted nowadays.:|

  5. Yeap wireless adaptor/wireless network card which ever way you wanna look at it.

    EEP inventory control, still it would be better than doing ethics. My god did that shit piss me right off. Its common sense for crying out loud. Mr Makay from south park could have summed the 6 month module up in one sentence

    Come on. I was just making sure.XD Quite shallow to get pissed off on something like that.:| Patience...XD

    HACKING IS BAD MMM KAY!

    I don't consider it black hat hacking. Just exploring the possibilities.XD

  6. AHHHhh so that's what you where asking, good thing Vector took over where I left off.

    Before you start flashing firmware be sure to check it out on the DD-WRT site for compatibility last thing you need is a $50+ paper weight.

    Client mode is most awesome I have a TP LINK configured in that manner and have it jacked into my hardware firewall then spat back out on a switch. Great thing with client mode is you can use all encryption methods. As far as I am aware using the Wireless distribution System (WDS) in point to point, multi point bridge and repeating only supports the use of WEP, please correct me if I am wrong. =)

    So let me get this straight. "Cleint mode" means using the wireless router as your wifi adapter? :D

    Hapster thanks for the suggestion and yeah a few people have told me to start learning perl. MMMM maybe when I get some of these bullshit assignments out the way with.

    Haha. I hear ya. I'm currently working on a system as part of my college course that involves inventory control and reporting stuff. BORING. It eats up my time to program stuff that I really want to. hehe

  7. ok so im thinking you might be a little confused on the whole router/wireless AP thing. any wireless router you buy today be it linksys, netgear, belkin, dlink etc will by default act as a wireless access point. it dosnt associate to another encrypted or unencrypted network.

    now that being said it sounds like what you might be trying to do is use your wireless router as a wireless adapter to connect to an available wireless access point near you. usually the stock firmware on your router will not allow client mode so a quick firmware upgrade (assuming your wireless router is supported) to dd-wrt will solve that problem and enable things like client, client bridge, wireless repeater, etc and a whole shitload of other options you never knew your router could do.

    Yep. That's what I'm trying to do. Thanks for making it clearer. Will look up on it. Any reference you would recommend in doing such a thing? Like controlling the router through the command line would be cool. haha. Never been a hardware guy. haha. Trying though.

  8. What you are saying makes perfect sense. I am not much of a coder and personally don't enjoy it but I suspect that's largely due to the fact I suck balls at it. I just started doing VBS as part of my networking course for automation and it all goes w00sh over my head. XD

    *I tip my hat to you* For having the patience to go to the effort of re-inventing the wheel, in the long run it will certainly pay off for ya.

    haha. If you want an easy language and if you're into networking, definitely go for Perl. It has all the tools you need to administer your network and quite easy to read (you could learn Perl in a day). You could even build a packet sniffer with only a few lines of code!:D

    Linux+Perl is a network admin's best friend and strongest weapon.XD

  9. Get yourself Back track and a supported wifi card and do some REAL testing XD

    As tempting as it sounds, I'm more on developing my own tools. Even if people say it's like trying to reinvent the wheel, it's quite an adventure. haha. I'm working on packet sniffing, analysis and mitm stuff...all command line and in C/C++.:D I just need to get my concepts straight in terms of networking. I did try BackTrack. It's fun. But it's more fun to code and see your product work. haha.

    Anyway, thanks again.:D Much appreciated.

  10. lol your post is a little confusing to read but its more than likely just me and a lack of sleep.

    Anyways if you are asking if your wireless AP has encryption and you try to connect to it via ethernet cable will it by pass the need for a WEP/WPA key, your answer is YES it does. The encryption only comes into play with wireless clients.

    Sorry if I miss read your post, I thought it was a how to setup a network type question.... my bad.

    LOL. Working too much? haha. joke.

    Ok thanks.:D I will try it out soon in my home network.:D

  11. Most home wireless access points are a Router/dsl modem and wireless access point all in one, so you may not have to connect the access point into the router or modem per say. More details required post model numbers please.

    But to answer your question yes you can have a completely wireless LAN network, sharing folders and internet connection. Generally speaking Router connected via ethernet to access point. then your laptop associates to the wireless AP and the router does its thing. The only part you may cock up and run into problems is assigning IP numbers and the possibility of having your AP and Router set to defaults and utilizing DHCP. If you want to have IP addressing assigned for you, Disable DHCP in the router and leave it on the access point. If you are anal like me and like to know the IP of your computer just give each device and comp one manually.

    Thanks for your reply.

    But what I meant was can I connect to the network from my laptop via ethernet by connecting it to the access point that is associated with the encrypted wireless network? Does it automatically bypass encryption since the wep/wpa/wpa2 encryption only encrypts packets for devices connecting to it wirelessly? I might have not understood your reply that much.:P

    For an illustration (a rather messy one): For example, this is my home network setup:

    Wireless router connected to modem. <-- another router turned to an access point connecting to the network <-- laptop connected to the said access point via ethernet

    Hope it's clear.XD What are your thoughts on this?

  12. Hi. I was wondering if this scenario is possible:

    *I'm still a bit rusty when it comes to networking so bare with me if it's a stupid post...

    What if you have a wireless router that can be converted to an access point. You associate the access point with a network encrypted with WEP or WPA or TheNextBigEncryptionForWifi. Then you plug-in an ethernet cable at the back of your router (that you set to act as an access point) and hook the other end to your laptop.

    Will you be able to connect to the network the access point is associated to?

  13. English xD

    Not to start a fire or anything, but most people on the Internet aren't quite "1337" when it comes to english. They'd post stuff thinking they know it all but when "your" should be "you're" you start to think what went wrong with the education system. I'm just saying, work on your english.:D Computer people should be intelligent. Don't disappoint the public now..XD

  14. With the unsecured you could always spoof the login page and just have people typing in their user names and passwords :)

    I don't think that's possible unless you can redirect traffic to pass by you first (some man in the middle process). Other than that, you'd have to hack the server I guess?O_o

  15. Well you could always arp poision and get the cookie, but any unsecure network that uses login from what I've seen anyway uses ssl during login.

    hmmm..but their login page starts with http. I may be mistaken but can I assume they're not using ssl because of this?

  16. depends... is the router running a DHCP server?

    Not really sure. How would I know? I tried nmap-ing the server but just got http 80 and other weird ports open. I think this kind of reconnaissance is quite blind. It's like trying to gain network access with only "can connect to network but keeps being redirected to login page" as your only info..XD

  17. I think simplest and easiest is quite subjective given the different syntax that different languages use. For me I'd say C++ over Java because I've been working with it longer. Java is technically easier than C++ but hey...there's always that language a programmer starts with and comes to love. It's like...there's no place like home... haha.

  18. With the whole login thing, somebody could sniff a cookie and spoof their MAC to bypass login...

    Curious, if you spoof a MAC address of another already logged in will that automatically assign the IP to you? Or will you have to do some extra hacker stuff to get that IP.

  19. Winners don't do WEP! or warez!

    LOL. Wasn't really looking for that kind of comment but thanks anyway. Yes WEP is weak. But believe it or not, most if not all the networks here at my country are using WEP for encryption. Ignorance is never bliss. hehe

  20. - The ovb. think blackhat. They don't have any reason to do personal browsing there, so no need to login once thier on the network. They just want to steal as much information as possible from the victims. A unsecure network should make this uber easy.

    - Easy access to your router from anyone who connects to the network. At least with secured though they could access it it would be limited to your customers and not just someone outside the shop within close range to connect.

    But all I see are ARP packets. How do they do that? It's probably just my sniffer but is it possible to see other tcp packets when you're connected to the network but not logged in?

  21. Hi. I was wondering which of the following network security architectures/designs is safer for wifi hotspots (in coffee shops, malls etc...).

    The first design I've encountered was where you could connect without any WEP/WPA authentication to the network but everytime you'd try to browse any pages in the Internet with your web browser, you'll be redirected to a login page. In order to login, you'll have to buy coffee to be given a randomly generated username and password (I'm assuming it's random. hehe) or you could buy user name and passwords for certain time lengths.

    The second one simply uses WEP/WPA encryption before you can access the network.

    For the first design, when sniffing the network (since you're already connected and assigned an IP address, all I get are ARP packets and other weird request packets).

    The next question prior to which one is better would be what are the security issues that involve both designs? Well ok, we all know there are ways to crack wep/wpa, but what about the first one? Will you have to hack some database where those user name and passwords are located?

    I'm not that knowledgeable yet in network designs and terminologies so all these are based from experience and curiosity. :) Hope to hear from your thoughts. Thanks

×
×
  • Create New...