ScottC Posted March 10, 2011 Share Posted March 10, 2011 Hi Just wondering if anybody here could recommend any software that can find hidden wireless networks? Ideally it needs to be simple to use so I can use it:) Thanks Quote Link to comment Share on other sites More sharing options...
Gaz6002 Posted March 10, 2011 Share Posted March 10, 2011 Ideally it needs to be simple to use ...and legal. Quote Link to comment Share on other sites More sharing options...
ScottC Posted March 10, 2011 Author Share Posted March 10, 2011 Is it illegal to look for them? Quote Link to comment Share on other sites More sharing options...
Gaz6002 Posted March 10, 2011 Share Posted March 10, 2011 Is it illegal to look for them? Is there a legal application for finding them? Quote Link to comment Share on other sites More sharing options...
stevie_b Posted March 10, 2011 Share Posted March 10, 2011 NetStumbler? -> http://www.netstumbler.com I think my Linux distro can detect them, but I'm guessing you're using Windows of some flavour. Quote Link to comment Share on other sites More sharing options...
Ark Posted March 10, 2011 Share Posted March 10, 2011 Is it illegal to look for them? Probably not to LOOK for them, just to hook into them. If it's legitimate for you to use, them you would know the details. This can be classified as computer mis-use, theft of resources, or hacking - some European states even make it a criminal offense with a prison term attached. Realistically you are unlikely to be caught, but you have to make your own mind up whether to do it. Quote Link to comment Share on other sites More sharing options...
ScottC Posted March 10, 2011 Author Share Posted March 10, 2011 Thanks Steve, in this case it's for a window 7 jobbie. Quote Link to comment Share on other sites More sharing options...
CJ Posted March 10, 2011 Share Posted March 10, 2011 NetStumbler? -> http://www.netstumbler.com I think my Linux distro can detect them, but I'm guessing you're using Windows of some flavour. Would this program tell me if someone else in my vicinity is using a wifi system and possibly stealing my bandwidth? Quote Link to comment Share on other sites More sharing options...
d-_-b Posted March 10, 2011 Share Posted March 10, 2011 Would this program tell me if someone else in my vicinity is using a wifi system and possibly stealing my bandwidth? You could avoid people using your system by setting a decent length WEP Key (which you may already have) & set up DNS filtering to only allow your devices. That would certainly help stop wifi stealing Quote Link to comment Share on other sites More sharing options...
CJ Posted March 10, 2011 Share Posted March 10, 2011 b;3057891']You could avoid people using your system by setting a decent length WEP Key (which you may already have) & set up DNS filtering to only allow your devices. That would certainly help stop wifi stealing I currently just turn off the wireless function on the Netgear router. I am assuming this is the best way to ensure nobody can access my bandwidth? Quote Link to comment Share on other sites More sharing options...
johnny g Posted March 10, 2011 Share Posted March 10, 2011 And MAC filtering, so only known MAC addresses. Quote Link to comment Share on other sites More sharing options...
d-_-b Posted March 10, 2011 Share Posted March 10, 2011 I currently just turn off the wireless function on the Netgear router. I am assuming this is the best way to ensure nobody can access my bandwidth? Yes, turning off the WiFi completely if you do not make use of it will stop the issue of anyone getting onto your router & using your net via the Wireless (as the router won't be broadcasting your connection). And MAC filtering, so only known MAC addresses. haha, my bad. Meant "MAC filtering", not DNS > Quote Link to comment Share on other sites More sharing options...
stevie_b Posted March 10, 2011 Share Posted March 10, 2011 I currently just turn off the wireless function on the Netgear router. I am assuming this is the best way to ensure nobody can access my bandwidth? It is the best way. No-one can access the wireless if the wireless is turned off. They'd have to be in the same room as the router with a spare ethernet cable in order to leech your bandwidth. As said, use a strong password with the best protocol your router will allow (IIRC, WPA2 is a fair bit more secure than WEP), and use MAC address filtering, and change the name of your network so it doesn't name the hardware or supplier (e.g. don't call your network something like DG834 or Sky), just in case a particular router has a vulnerability that knowledgeable hackers can exploit. Highly unlikely but it's good practice. Quote Link to comment Share on other sites More sharing options...
stevie_b Posted March 10, 2011 Share Posted March 10, 2011 Would this program tell me if someone else in my vicinity is using a wifi system and possibly stealing my bandwidth? No. Your best bet to tell who has used your wireless is by looking at the router's logs. Not sure if they offer that info though as I've never done it. NetStumbler tells you what wireless networks are operating near you, what channel they're on, what their encryption protocol is, etc. Quote Link to comment Share on other sites More sharing options...
johnny g Posted March 10, 2011 Share Posted March 10, 2011 Wifi Analyzer for Android and iPhone does the same. Great piece of s/ware Quote Link to comment Share on other sites More sharing options...
Matt H Posted March 10, 2011 Share Posted March 10, 2011 Pay for your own wifi freeloader Quote Link to comment Share on other sites More sharing options...
ScottC Posted March 10, 2011 Author Share Posted March 10, 2011 Who said anything about using it? Quote Link to comment Share on other sites More sharing options...
CJ Posted March 10, 2011 Share Posted March 10, 2011 Who said anything about using it? I sort of clarified why I was interested in it. Why are you? Quote Link to comment Share on other sites More sharing options...
Purity14 Posted March 10, 2011 Share Posted March 10, 2011 Not sure if it has been mentioned but download a copy of Backtrack - i have a bootable USB version and use airocrack or something - collect enough data from one of the AP's and you can figure out the wep key. No point brute forcing WPA because it takes too long in my experience, damn skyboxes But along with a mac address changer you can get on hotel wifi for free if you replicate another users mac address - which you can snoop out of the air using airocrack. You will need an external wifi adapter though, as you need to listen on one and inject packets with the other. http://www.backtrack-linux.org/ HTH Quote Link to comment Share on other sites More sharing options...
Purity14 Posted March 10, 2011 Share Posted March 10, 2011 Best advice is to firstly use WPA. Use mac filtering. Change the router default username and password. Turn off DHCP and specify your own IP addresses. That will stop most people obtaining your wifi. But if someone is determined enough and wants to get in, they will get in. Quote Link to comment Share on other sites More sharing options...
Matt H Posted March 15, 2011 Share Posted March 15, 2011 Who said anything about using it? What's your reason then? Just curious? Quote Link to comment Share on other sites More sharing options...
neo2810 Posted March 15, 2011 Share Posted March 15, 2011 Forget about MAC filtering and hiding SSID. As purity has already described, a few simply script kiddy tools and you're passed those. All they do is add more admin for yourself. All you need is WPA2 applied with a 20 character key using symbols, numbers and letters and you're totally secure. WPA2 with a strong key has yet to be hacked. Disabling DHCP is also largely pointless and just adds complexity to your network. Provided you have a decent firewall in place blocking all incoming traffic, running DHCP is perfectly safe. Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.