Announcement

Collapse
No announcement yet.

Wardriving eyeopener

Collapse
X
  • Filter
  • Time
  • Show
Clear All
new posts

  • Wardriving eyeopener

    So my access point got cracked the other day by a wardriver--my bad for leaving a linksys router with the default password and default network name. I've learned my lesson, downloaded the firmware updates, enabled 128-bit WEP, turned off ESSID broadcast, and put all my home computers onto the MAC address control list.

    It piqued my curiosity, though, so I threw a wireless USB adapter (with no special antennas) on my carputer . On the 3-mile drive between my house and work, there was 1 unsecured Tsunami-based network at the local bank, and 4 unsecured linksys networks. All the linksys networks still had the default password on the router.

    Resisting the urge to knock on doors or change passwords, I drove on. A little wiser, a little astonished, and a little ashamed for how easy I had made it for someone to get my AP.

    I think I'll spend the day today password protecting the setups on all my printers at work, no more honor system.
    Aku, Soku, Zan.
    Epia M10000 Nehemiah
    Lilliput
    ITPS Power Sequencer

  • #2
    Originally posted by saito
    there was 1 unsecured Tsunami-based network at the local bank,
    makes you nervous about how well your money is protected...
    I don't need no stinkin' startup-shutdown controller... That's what journalized filesystems are for...
    NavSys, the ultimate navigation app
    http://www.navsys.org/

    Comment


    • #3
      well lesson learned, but do realize that the term "wardriver" does not mean what you are using it as, a wardriver is just a person who geocache's aps. what happened to you was just a hacker/cracker/punk whatever, not a wardriver

      and i would not suggest knocking on any doors, people have gotten in a ton of trouble for doing such a thing, if you are choosing to do that i would suggest maybe getting the "ethical hacker certification" (for what its worth it shows you are a good guy) before you go knocking on doors, also make sure that you have a company backing before you do this so that will help your case also

      1997 Jeep Wrangler Rugged Waves


      Ebay Stuff For Sale

      Comment


      • #4
        freestyle has a point, my friend got interrigated by the Secret Service because he tried to help a friend of his room mates out. He discovered that the company left their IIS servers bare-assed naked to the world. He told his room mate what he found, room mate knew the sys admin, tried to warn him of what was happening, sys admin called the secret service. Luckily my friend got off since he didn't do anything.

        Comment


        • #5
          Saito,

          I've found a neat little geo-plot software app that let's you use geo data caputured by NetStumbler to plot the access points on a topo map. The topo info is free and downloaded automatically by the application. I've uploaded one of my "runs" HERE under WiFi/WarDriving.

          Enjoy!
          MikeH

          Comment


          • #6
            tsunami is the default for a Cisco aronet 340 (and maybe others). I resumed my laptop one day at work and got a connection, seems one of the neighboring offices must have bought a wireless AP. Changed to dhcp and was given an address. I could browse the local network and see their servers/workstations. I was wide open to the internet and even ran p2p software on their connection. My boss told me I should hack their server and leave a file on there saying "to prevent this call ###-#### and for $200/hour I will tell you how to secure your network". After my company laid us off, one of the guys I worked with got hired on at the company with the AP so I ask him when I see him now if he's secured it yet

            Comment


            • #7
              Occasionly if I leave my wifi card plugged in it will connect automaticly to an open AP chances that might have been the case.

              Comment


              • #8
                Originally posted by saito
                there was 1 unsecured Tsunami-based network at the local bank, and 4 unsecured linksys networks.
                Just because the wireless is unsecured doesn't mean their network is. The wireless could be firewalled off from the interior network and probably requires VPN to access their network. You might be able to connect to the AP but can't get anywhere from there.

                Comment


                • #9
                  Originally posted by MikeH
                  Saito,

                  I've found a neat little geo-plot software app that let's you use geo data caputured by NetStumbler to plot the access points on a topo map. The topo info is free and downloaded automatically by the application. I've uploaded one of my "runs" HERE under WiFi/WarDriving.

                  Enjoy!
                  What's the link to the topo software? I've got Netstumbler and hit 42 access points on my 11 mile trip to work. About 50% of them are unsecured. I'd like to plot the data with an app.
                  Originally posted by ghettocruzer
                  I was gung ho on building a PC [until] just recently. However, between my new phone having internet and GPS and all...and this kit...Im starting to have trouble justfiying it haha.
                  Want to:
                  -Find out about the new iBug iPad install?
                  -Find out about carPC's in just 5 minutes? View the Car PC 101 video

                  Comment


                  • #10
                    You can upload your NS logs to www.gpsvisualizer.com

                    Comment


                    • #11
                      Originally posted by cash_Money
                      You can upload your NS logs to www.gpsvisualizer.com
                      Looks pretty cool. Thanks!
                      Originally posted by ghettocruzer
                      I was gung ho on building a PC [until] just recently. However, between my new phone having internet and GPS and all...and this kit...Im starting to have trouble justfiying it haha.
                      Want to:
                      -Find out about the new iBug iPad install?
                      -Find out about carPC's in just 5 minutes? View the Car PC 101 video

                      Comment


                      • #12
                        Best war driving action I found so far was in NYC... Stepped out of a car near the village with my PDA and a cheap Dlink card, had an "open" connection with DHCP soon as I turned it on. Walked 1 block and found over a dozen more, most open with DHCP. Hopped in a cab and went 10 blocks and it logged 40 beacon hits in that distance. All this from a PDA only. My friend who was with me commented that Verizon had less coverage in that area

                        I love open wi-fi connections, great for peer to peer file swaping.

                        Comment


                        • #13
                          Originally posted by saito
                          So my access point got cracked the other day by a wardriver
                          How do you know it got "cracked"?
                          Current Vehicle: 2007 Dodge Nitro

                          Second Vehicle: Sold it :( 2005 Dodge Ram 1500 Quad Cab

                          First Vehicle: 2003 Ford Ranger

                          Comment


                          • #14
                            Anyone getting free WiFi or GPRS (other than the T-mobile thing) in UK?

                            John
                            My Nissan 200SX @ Silverstone
                            NOW SADLY WRITTEN OFF!

                            My Car's spec list + pics

                            Stealth CarPC fab'ing...

                            Comment


                            • #15
                              Id suggest putting in a MAC filter, unless they have your MAC or can spoof it, they cant get on your network.
                              2011 Nissan Frontier SL
                              AMD X3 2.2 | M4-ATX | 16Gb SSD | 2GB DDR3-1333 | MSI GF615M-P33 MB
                              OBDPROS USB | BU-303 GPS l LILLIPUT TS | Car2PC adapter | XM Direct | USB Dual band N with custom mag-mount antenna.

                              Comment

                              Working...
                              X