I wasn’t able to create an account other than root for a while, then i learned how to do it in the terminal. I made the non root account, and I noticed that it doesn’t have the content that the root user has, and it isn’t even the administrator. I went back to the root account (I’m 99.9% I still had wireless connection), and made the account an administrator. After that I went to the main storage, and changed the permissions of the main storage (computer) as a whole. Then I went back to the normal account and noticed that I didn’t have the option of wireless connection anymore, and neither do I on root (I have the driver installed still, and it worked perfectly before). What could I do to bring wifi back? Your help would be much apriciated!
I’m considering developing a simple WiFi scanner and logging App that can run as a service 24 hours a day for months passively collecting changes in the surrounding wireless environment with the following features:
- Log changes to BSSDs, ESSDs SSIDs, signal strength, number of clients, etc.
- Displaying everything on a simple dashboard;
- Notifications of new access points setup in the surrounding area;
- Notifications of new WiFi clients;
- Notifications of SSID changes;
- Possibly capture handshakes (though that’s not a primary objective);
- Run on a low cost platform such as a Raspberry Pi with a simple
apt-get installto get it started.
I’m very well aware that other solutions exit such as Kismet Logging but I don’t want invest too much time recreating a solution that already exists. Is there something that already does all of this, or a combination of tools I can try? E.g. Kismet & Kibana in a Docker image?
I’m interested in methods/solutions for blocking incoming and/or out-going WhatsApp requests and/or traffic on a personal home Google WiFi network.
I also have the Google WiFi app with manager/admin rights.
I need an assistant to answer the following questions:
Given a WIFI network in the drawing. The large circles represent transmission ranges of stations A and D, and small dashed circles represent ranges of B and C. Assume that there is no loss of parcels on the network other than a collision.
- When Station C transmits to B Who are the hidden terminals?
- When station C transmits to B which stations are silent because they received an RTS/CTS message?
Given that Station A transmits to B and after expansion time Station C wants to transmit to D.
- Assume that no collision detection/collision avoidance/ACK mechanism exists. Hanna claims that only C’s message will reach her destination. Is Hannah right? necrosis.
- In the directive that only uses CSMA/CA (i.e. without the RTS/CTS mechanism), Anna claims that only A’s message will reach its destination. Dana claims that the 2 messages will reach your destination. Who is right? necrosis.
- Oren offered to improve utilization by upgrading the protocol by adding an RTS / CTS mechanism. Is Oren right?
Wouldn’t using Starbucks Wifi make me somewhat anonymous since my ip address would be the same as other users connected to the same network? Therefore, no need to use a VPN assuming I don’t want the website I’m connected to know my identify. Of course, the website can figure who I am assuming my browser fingerprints is unique. However, assuming I change my browser fingerprints every session, then I should be fine. Correct?
I decided to use my personal Macbook at work, so I’ll be using my employer’s network connection. But I’m really concerned about my privacy. I know I can do non-work stuff using Tor Browser or Brave’s Private window with Tor, but what about my reminders, notes, voice memos and other Apple’s built in apps? I am really freaked about my personal stuff. How can I prevent them from accessing it? I know they may never do it, but if there is even the smallest risk, I want to prevent it somehow. Let’s say I create another user account specifically for work without logging my Apple ID and use it, will it prevent them from accessing my data stored on another (personal) account?
I am renting a room and using shared home WiFi network. The owner has setup a Netgear WiFi range extender for me. I have another roommate on the same network along with the owners. I use Nord VPN. Since a few months I have been getting weird emails…someone opens accounts (like Snapchat, SoundCloud, Pinterest etc.) in my name constantly. I close one account and two more gets opened. I accessed those accounts and they had photos and stuff, so someone had been using them. I noticed that date of birth in one account was a date of significance to me (not my dob) and year in the username was a significant year related to that date. So it is confirmed that I’m hacked. On top of that yesterday I accessed my new website hosting service and made some changes to start a website, today this person opened an account for hiring employees. I believe someone can access (Hack into) my devices through home WiFi. Is there a way to monitor who is accessing and stop it in real time like a firewall. I use iPad and surface pro. Any advice to secure my devices?
I’ve been looking into captive portal WiFi implementations and on a few I’be been able to easily bypass their login with the following steps:
- 1) Open Wireshark and run a report getting the most used IPs in my network (except the router’s IP and mine)
- Chang my mac address to that IPs associated mac
- refreshing the NIC
My rational was that it seemed like most captive portal just redirect all your traffic to a login page, once you login it seems to whitelist your mac. So I just found the IPs that had the most traffic that were on my network and assumed they are probably already authorized to use the internet. Sometimes it takes a few tries to get the right mac, but this normally works. I’m wondering what other better authentication methods are out there that solve this problem.
While reading articles regarding improving WiFi security, I saw quite a few of them recommend starting Guest WiFi networks.
For instance, see point 4 in the following article:
One of the commonly cited benefits is that enabling Guest WiFi limits the number of people having access to your regular network. The idea being, only the members of the household will use the regular network and the guests will be isolated to the guest network.
Are there any downsides to this approach? Are there any overlaps between the Guest network and the regular network that an ordinary user should be aware of?
My concern stems from my general lack of education on this matter. To me it seems like creating two doors to the same house. Now I have to worry about securing an additional door, and I haven’t properly understood the benefit of having added an extra door.
I got the WPA handshake, now it’s turn to crack the password using Hashcat. First, I wanted to make a wordlist of passwords [A-Z] the length of 8, but Crunch (the tool in Kali Linux) said it will take 1TB of storage that I don’t have available, so I gave up that way. Is there any way to generate passwords (example: ABCDEFGH) and delete them after its use one by one, during the cracking process?
How long does it take to crack the password with i5-3320M CPU using Hashcat? Is there any other way you recommend?