I can’t use the wifi because of permission issues [closed]

I wasn’t able to create an account other than root for a while, then i learned how to do it in the terminal. I made the non root account, and I noticed that it doesn’t have the content that the root user has, and it isn’t even the administrator. I went back to the root account (I’m 99.9% I still had wireless connection), and made the account an administrator. After that I went to the main storage, and changed the permissions of the main storage (computer) as a whole. Then I went back to the normal account and noticed that I didn’t have the option of wireless connection anymore, and neither do I on root (I have the driver installed still, and it worked perfectly before). What could I do to bring wifi back? Your help would be much apriciated!

Detecting changes in surrounding Wi-Fi networks

I’m considering developing a simple WiFi scanner and logging App that can run as a service 24 hours a day for months passively collecting changes in the surrounding wireless environment with the following features:

  • Log changes to BSSDs, ESSDs SSIDs, signal strength, number of clients, etc.
  • Displaying everything on a simple dashboard;
  • Notifications of new access points setup in the surrounding area;
  • Notifications of new WiFi clients;
  • Notifications of SSID changes;
  • Possibly capture handshakes (though that’s not a primary objective);
  • Run on a low cost platform such as a Raspberry Pi with a simple apt-get install to get it started.

I’m very well aware that other solutions exit such as Kismet Logging but I don’t want invest too much time recreating a solution that already exists. Is there something that already does all of this, or a combination of tools I can try? E.g. Kismet & Kibana in a Docker image?

CTS/RTS, WIFI wireless and CSMA/CA

I need an assistant to answer the following questions:

Given a WIFI network in the drawing. The large circles represent transmission ranges of stations A and D, and small dashed circles represent ranges of B and C. Assume that there is no loss of parcels on the network other than a collision.

enter image description here

  1. When Station C transmits to B Who are the hidden terminals?
  2. When station C transmits to B which stations are silent because they received an RTS/CTS message?

Given that Station A transmits to B and after expansion time Station C wants to transmit to D.

  1. Assume that no collision detection/collision avoidance/ACK mechanism exists. Hanna claims that only C’s message will reach her destination. Is Hannah right? necrosis.
  2. In the directive that only uses CSMA/CA (i.e. without the RTS/CTS mechanism), Anna claims that only A’s message will reach its destination. Dana claims that the 2 messages will reach your destination. Who is right? necrosis.
  3. Oren offered to improve utilization by upgrading the protocol by adding an RTS / CTS mechanism. Is Oren right?

Thanks

Assuming I’m using Starbucks Wifi, is there a point of using a VPN if I want to remain anonymous?

Wouldn’t using Starbucks Wifi make me somewhat anonymous since my ip address would be the same as other users connected to the same network? Therefore, no need to use a VPN assuming I don’t want the website I’m connected to know my identify. Of course, the website can figure who I am assuming my browser fingerprints is unique. However, assuming I change my browser fingerprints every session, then I should be fine. Correct?

Personal computer + employer’s WiFi [duplicate]

I decided to use my personal Macbook at work, so I’ll be using my employer’s network connection. But I’m really concerned about my privacy. I know I can do non-work stuff using Tor Browser or Brave’s Private window with Tor, but what about my reminders, notes, voice memos and other Apple’s built in apps? I am really freaked about my personal stuff. How can I prevent them from accessing it? I know they may never do it, but if there is even the smallest risk, I want to prevent it somehow. Let’s say I create another user account specifically for work without logging my Apple ID and use it, will it prevent them from accessing my data stored on another (personal) account?

Firewall for my devices (iPad, iPhone, surface) on a shared home WiFi network?

I am renting a room and using shared home WiFi network. The owner has setup a Netgear WiFi range extender for me. I have another roommate on the same network along with the owners. I use Nord VPN. Since a few months I have been getting weird emails…someone opens accounts (like Snapchat, SoundCloud, Pinterest etc.) in my name constantly. I close one account and two more gets opened. I accessed those accounts and they had photos and stuff, so someone had been using them. I noticed that date of birth in one account was a date of significance to me (not my dob) and year in the username was a significant year related to that date. So it is confirmed that I’m hacked. On top of that yesterday I accessed my new website hosting service and made some changes to start a website, today this person opened an account for hiring employees. I believe someone can access (Hack into) my devices through home WiFi. Is there a way to monitor who is accessing and stop it in real time like a firewall. I use iPad and surface pro. Any advice to secure my devices?

What is the best form of authorization for captive portal WiFi

I’ve been looking into captive portal WiFi implementations and on a few I’be been able to easily bypass their login with the following steps:

  1. 1) Open Wireshark and run a report getting the most used IPs in my network (except the router’s IP and mine)
  2. Chang my mac address to that IPs associated mac
  3. refreshing the NIC

My rational was that it seemed like most captive portal just redirect all your traffic to a login page, once you login it seems to whitelist your mac. So I just found the IPs that had the most traffic that were on my network and assumed they are probably already authorized to use the internet. Sometimes it takes a few tries to get the right mac, but this normally works. I’m wondering what other better authentication methods are out there that solve this problem.

Breaking Wifi password knowing its length of 8 [A-Z] alpha (upper-case) characters using Hashcat

I got the WPA handshake, now it’s turn to crack the password using Hashcat. First, I wanted to make a wordlist of passwords [A-Z] the length of 8, but Crunch (the tool in Kali Linux) said it will take 1TB of storage that I don’t have available, so I gave up that way. Is there any way to generate passwords (example: ABCDEFGH) and delete them after its use one by one, during the cracking process?

How long does it take to crack the password with i5-3320M CPU using Hashcat? Is there any other way you recommend?