I need an assistant to answer the following questions:
Given a WIFI network in the drawing. The large circles represent transmission ranges of stations A and D, and small dashed circles represent ranges of B and C. Assume that there is no loss of parcels on the network other than a collision.
- When Station C transmits to B Who are the hidden terminals?
- When station C transmits to B which stations are silent because they received an RTS/CTS message?
Given that Station A transmits to B and after expansion time Station C wants to transmit to D.
- Assume that no collision detection/collision avoidance/ACK mechanism exists. Hanna claims that only C’s message will reach her destination. Is Hannah right? necrosis.
- In the directive that only uses CSMA/CA (i.e. without the RTS/CTS mechanism), Anna claims that only A’s message will reach its destination. Dana claims that the 2 messages will reach your destination. Who is right? necrosis.
- Oren offered to improve utilization by upgrading the protocol by adding an RTS / CTS mechanism. Is Oren right?
Wouldn’t using Starbucks Wifi make me somewhat anonymous since my ip address would be the same as other users connected to the same network? Therefore, no need to use a VPN assuming I don’t want the website I’m connected to know my identify. Of course, the website can figure who I am assuming my browser fingerprints is unique. However, assuming I change my browser fingerprints every session, then I should be fine. Correct?
I decided to use my personal Macbook at work, so I’ll be using my employer’s network connection. But I’m really concerned about my privacy. I know I can do non-work stuff using Tor Browser or Brave’s Private window with Tor, but what about my reminders, notes, voice memos and other Apple’s built in apps? I am really freaked about my personal stuff. How can I prevent them from accessing it? I know they may never do it, but if there is even the smallest risk, I want to prevent it somehow. Let’s say I create another user account specifically for work without logging my Apple ID and use it, will it prevent them from accessing my data stored on another (personal) account?
I am renting a room and using shared home WiFi network. The owner has setup a Netgear WiFi range extender for me. I have another roommate on the same network along with the owners. I use Nord VPN. Since a few months I have been getting weird emails…someone opens accounts (like Snapchat, SoundCloud, Pinterest etc.) in my name constantly. I close one account and two more gets opened. I accessed those accounts and they had photos and stuff, so someone had been using them. I noticed that date of birth in one account was a date of significance to me (not my dob) and year in the username was a significant year related to that date. So it is confirmed that I’m hacked. On top of that yesterday I accessed my new website hosting service and made some changes to start a website, today this person opened an account for hiring employees. I believe someone can access (Hack into) my devices through home WiFi. Is there a way to monitor who is accessing and stop it in real time like a firewall. I use iPad and surface pro. Any advice to secure my devices?
I’ve been looking into captive portal WiFi implementations and on a few I’be been able to easily bypass their login with the following steps:
- 1) Open Wireshark and run a report getting the most used IPs in my network (except the router’s IP and mine)
- Chang my mac address to that IPs associated mac
- refreshing the NIC
My rational was that it seemed like most captive portal just redirect all your traffic to a login page, once you login it seems to whitelist your mac. So I just found the IPs that had the most traffic that were on my network and assumed they are probably already authorized to use the internet. Sometimes it takes a few tries to get the right mac, but this normally works. I’m wondering what other better authentication methods are out there that solve this problem.
While reading articles regarding improving WiFi security, I saw quite a few of them recommend starting Guest WiFi networks.
For instance, see point 4 in the following article:
One of the commonly cited benefits is that enabling Guest WiFi limits the number of people having access to your regular network. The idea being, only the members of the household will use the regular network and the guests will be isolated to the guest network.
Are there any downsides to this approach? Are there any overlaps between the Guest network and the regular network that an ordinary user should be aware of?
My concern stems from my general lack of education on this matter. To me it seems like creating two doors to the same house. Now I have to worry about securing an additional door, and I haven’t properly understood the benefit of having added an extra door.
I got the WPA handshake, now it’s turn to crack the password using Hashcat. First, I wanted to make a wordlist of passwords [A-Z] the length of 8, but Crunch (the tool in Kali Linux) said it will take 1TB of storage that I don’t have available, so I gave up that way. Is there any way to generate passwords (example: ABCDEFGH) and delete them after its use one by one, during the cracking process?
How long does it take to crack the password with i5-3320M CPU using Hashcat? Is there any other way you recommend?
Was reading this: How to check if a Wi-Fi network is safe to connect to?
When I came across some comments
I can redirect you to other pages without your interaction. Install key loggers. Heck if your browser runs activeX objects I could open a shell on your machine without your knowledge. That last example is rare these days but what’s not rare is tricking you into installing a shell for me, keylogging, session stealing, and redirection.
Or as I mentioned in my post, drop a crypto miner on your machine with the tool I wrote
Written by Anthony Russell in the comments of his answer.
What I’m most worried about is virus injection. But other attacks (like key loggers) mentioned above are concerns too. Just share whatever comes to mind. I’m sure other people will fill in the blanks.
Sorry if I sound like a complete noob. That’s because I am. Sorry in advance.
Say I enter a place with public WIFI. Of course, I would not connect to the network since I know it’s risky, but I do have my computer turned on. Can an attacker know my computer is there and force a connection to it? If they would be able to do so, than my precaution is wasted, and any attacks a malicious network could do would be done.
Telling me whether this could be done and how to stop it would be very helpful, thanks.
As a sidenote, connecting to a known network may not be safe either, could hackers “replace” an existing network with a malicious network with the same name? If so, how to protect myself against it?
I know that even when connected to a VPN, the ISP (or anyone who controls my WIFI network) could see that I am connected to
(A VPN brand), what I would like to know is would they obtain the exact IP that I’m connected to.
As a side note, what could the ISP really see when I use VPN? I imagine packet size and frequency should be compromised, but what else? (MAC? hostname? DNS info?)