dcsimg
Page 3 of 3 FirstFirst 123
Results 21 to 27 of 27

Thread: Can i be traced while using a spoofed Mac Addresse?

  1. #21
    Junior Member
    Join Date
    Jan 2010
    Posts
    4
    Instead of setting up tor entry and exit nodes and leeching off of some kids 'sploits... one of these days im going to have to setup a non-encrypted and non-passworded wireless access point. Wink Wink...

    Maybe nab login details from these smelly-ass minoritys that don't want to waste their monthly checks on internet access.

  2. #22
    THE Bastard Sys***** dinowuff's Avatar
    Join Date
    Jun 2003
    Location
    Third planet from the Sun
    Posts
    1,251
    SPEC Setting entry and exit nodes implies that you know someone is going to connect to your ap

    Nihil I agree law enforcement / human behavior precludes capture.

    Cyber you are correct - less you forgot to use spell check.

    What I am asking is this...

    No logs, No "Traps", is there any software that one can run to see - direction and distance, from where a connected device is located. and if not, how would you gather such information. i.e. give me a skiddie tool that lets me know the direction, distance and time of connection from all connected devices to my AP
    09:F9:11:02:9D:74:E3:5B8:41:56:C5:63:56:88:C0

  3. #23
    Banned
    Join Date
    Nov 2002
    Posts
    677
    Quote Originally Posted by ♥The♥Specialist♥ View Post
    Maybe nab login details from these smelly-ass minoritys that don't want to waste their monthly checks on internet access.
    http://www.youtube.com/watch?v=BxV3zLucNqk

  4. #24
    Senior Member nihil's Avatar
    Join Date
    Jul 2003
    Location
    United Kingdom: Bridlington
    Posts
    17,190
    No logs, No "Traps", is there any software that one can run to see - direction and distance, from where a connected device is located. and if not, how would you gather such information. i.e. give me a skiddie tool that lets me know the direction, distance and time of connection from all connected devices to my AP
    I am not aware of any such software, at least not that is available to the general public.

    There was a case over here recently where a paedophile was using someone's unsecured AP. The ring was using a "dead letter box" e-mail account to peddle their filth.

    This guy had made the mistake of once accessing the e-mail from his place of work. As this was a large organisation and logs were not available, there was no joy there.

    The police ran the past and present employee registers against all people living within estimated range of the insecure AP and got one hit.............. job done, but not with sophisticated electronics or software. Given the amount of effort involved, if that solution had been available I am sure that they would have used it.

  5. #25
    Banned
    Join Date
    Jan 2008
    Posts
    605
    SPEC Setting entry and exit nodes implies that you know someone is going to connect to your ap
    The way Tor is setup, all you have to do is run it and you'll get a terabyte dump of "financial aid" as its called. And as for wireless networks... the first thing people do when they see a wireless network is connect to it.

    give me a skiddie tool that lets me know the direction, distance and time of connection from all connected devices to my AP
    Most routers just have two small antennas pointing upward. But with something resistant to radio waves wrapped around it you could shape and angle the access point. Then it would be a matter of very slowly pointing it in directions every three to fifteen seconds (enought time for a machine to automaticly detect it and login.)

    As silly as it sounds... I bet it would work.
    Last edited by The-Spec; January 6th, 2010 at 04:00 AM.

  6. #26
    Keeping The Balance CybertecOne's Avatar
    Join Date
    Aug 2004
    Location
    Australia
    Posts
    660
    And as for wireless networks... the first thing people do when they see a wireless network is connect to it.
    Well, there is not much you can tell about a wireless network unless you are connected. For instance, without connecting to the AP/network - you would not be able to see the IP Traffic, or glean any useable data.

    The most you could do without connecting to the AP is analyse the analog wifi signal, but without being able to knowingly and intelligently filter the frequency it is basically useless data.

    Please correct me if this is off mark as I am slightly more curious than I was yesterday.

    CTO
    "Any intelligent fool can make things bigger and more complex... It takes a touch of genius --- and a lot of courage to move in the opposite direction."
    - Albert Einstein

  7. #27
    StOrM™
    Join Date
    Aug 2004
    Posts
    1,003
    Hey Dino, I am sorry to respond to this so late. I never bothered to check the thread post replying to it. But the way the situation is put forward, there is no way you can be tracked. Only time you can be tracked is if you are still connected to the AP. This also has limitation's as pointed out by few members. Besides that there is no way you can be tracked, post you logging off. There are lot of variable factors (changing the MAC, machine name, VMware) etc that can be done before logging on that you will never be able to trace back too
    Parth Maniar,
    CISSP, CISM, CISA, SSCP

    *Thank you GOD*

    Greater the Difficulty, SWEETER the Victory.

    Believe in yourself.

Similar Threads

  1. Tools for tracking spoofed IP addresses
    By wazmo in forum Network Security Discussions
    Replies: 10
    Last Post: November 13th, 2009, 01:54 AM
  2. eudora bug used to send spoofed mail
    By mohitgarg in forum Newbie Security Questions
    Replies: 20
    Last Post: June 26th, 2005, 12:40 AM
  3. Tcp/ip
    By gore in forum Newbie Security Questions
    Replies: 11
    Last Post: December 29th, 2003, 08:01 AM
  4. Sniffing switchs with spoofed arp messages..
    By br_fusion in forum Newbie Security Questions
    Replies: 5
    Last Post: July 24th, 2003, 04:55 AM
  5. Spoofed IPs
    By stuart in forum Miscellaneous Security Discussions
    Replies: 8
    Last Post: March 19th, 2002, 09:23 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •