Page 1 of 2 12 LastLast
Results 1 to 10 of 14

Thread: What can I do with a WAP

  1. #1
    Junior Member
    Join Date
    Feb 2005
    Posts
    17

    What can I do with a WAP

    I have a friend that has an unsecured wireless G connection. I know this because i built his computer, and he demanded a wireless connection so he did not have to run ethernet cables from his downstairs to his upstairs room. Say I park outside his house with my laptop. All of a sudden a dialog box pops up saying I have a new wireless connection available by linksys. I connect to this wireless connection and have free internet as I assume. So this means I have access to his network.

    Well my question is, what else can I do by invading his wireless connection besides looking at his "Shared Documents Folder" since he prob isnt smart enough and doesnt care to share any important information with his parents computer. And getting free internet.

    Can I look at his web logs or anything, Just curious of what I could do.

  2. #2
    Senior Member kr5kernel's Avatar
    Join Date
    Mar 2004
    Posts
    347
    you can do pretty much anything, as you would be on his local network. If he wasnt smart enough to setup any security then he probably didnt bother to change the default passwords on his router or his access point.

    Tell him to get some security on that, wep, mac address filtering, and disabling ssid are a good start but shoudl not be the only means of security. Firewalls, AV, etc are essential. This shoudl at leats help him from being a statistic that we see on AO everyday.
    kr5kernel
    (kr5kernel at hotmail dot com)
    Linux: Making Penguins Cool Since 1994.

  3. #3
    Junior Member
    Join Date
    Feb 2005
    Posts
    17
    Ya I am positive he has not changed his default router password, because I was the one who set up his wireless router and connection.

    I think sometime I am going to freak him out and use his printer and print out a bunch of pornography, since I know his printer is shared on his computer.

  4. #4
    Senior Member kr5kernel's Avatar
    Join Date
    Mar 2004
    Posts
    347
    Or you could be helpful and tell him how to fix his problems.
    kr5kernel
    (kr5kernel at hotmail dot com)
    Linux: Making Penguins Cool Since 1994.

  5. #5
    In And Above Man Black Cluster's Avatar
    Join Date
    Feb 2005
    Posts
    912
    This is an illegal practice. You shoudl work on securing his connection not learning how to exploit it...
    Would you vandalize if you knew how?
    I don't think that you would like to be in his shoes, do you?
    This is not the right place to ask such a question...
    I don't know if the rest agree with me, or not?
    What would you do if you gained access to someone's house?... Stealing.. at least this what police will consider...
    So be more helpfull and ask how to protect him.. or fix this problem...

    Cheers
    \"The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards - and even then I have my doubts\".....Spaf
    Everytime I learn a new thing, I discover how ignorant I am.- ... Black Cluster

  6. #6
    AO Veteran NeuTron's Avatar
    Join Date
    Apr 2003
    Posts
    550
    You know, if you set this up for him...maybe it would be more responsible and a better use of your knowledge to secure his AP instead of leaving him at the mercy of you and any other war driver that feels like trashing his box. And coming to our site to ask for ways mess with this guy, who is only vulnerable becasue you left him vulnerable, is pretty stupid and wont get you any respect or praise in our community.


    <Edit>lol...all three of us must have been writing replies at the same time...

  7. #7
    Junior Member
    Join Date
    Feb 2005
    Posts
    17
    I know i know I was just saying it would be funny. I would notify him of his problems and secure his network. I would just let him know his vulnerabilities first.

  8. #8
    AO Veteran NeuTron's Avatar
    Join Date
    Apr 2003
    Posts
    550
    Originally posted here by JohnHarten
    I know i know I was just saying it would be funny. I would notify him of his problems and secure his network. I would just let him know his vulnerabilities first.
    Well, from the looks of your first post...it sounds like you really dont know his vulnerabilities. Hopefully you know how to secure it...so why not start there instead, huh?

  9. #9
    Junior Member
    Join Date
    Feb 2005
    Posts
    17
    true, i am a newbie "AntiOnline Newbie"

    I am just learning everything for myself. And in order to solve the problems you first need to recognize them and that is what I am trying to do i suppose

  10. #10
    In And Above Man Black Cluster's Avatar
    Join Date
    Feb 2005
    Posts
    912
    Originally posted here by JohnHarten
    I know i know I was just saying it would be funny. I would notify him of his problems and secure his network. I would just let him know his vulnerabilities first.
    You might not?
    \"The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards - and even then I have my doubts\".....Spaf
    Everytime I learn a new thing, I discover how ignorant I am.- ... Black Cluster

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •