Re: A Strange Networking Setup

2006-11-02 Thread Ron Johnson
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 11/01/06 21:26, Leonid Grinberg wrote:
 Hello all,
 
 I am currently running a Linksys WRT54G server with the factory
 firmware. I have set it up to use wireless. I have purposefully not
 encrypted or protected the WAP because i want others to be able to use
 it if they want to (doing my part for society and all that). I do,

Do you also leave your front door open (not just unlocked), so that
someone can come take a piss in your bathroom and maybe read your
mail and take your TV while you're at work?

- --
Ron Johnson, Jr.
Jefferson LA  USA

Is common sense really valid?
For example, it is common sense to white-power racists that
whites are superior to blacks, and that those with brown skins
are mud people.
However, that common sense is obviously wrong.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFFShXTS9HxQb37XmcRAqAYAKCRYT9pRBpW9ttiBVbH4Ora1bz6zwCgpJEh
q7UNFTUrZxtrpWxx9CO7XJk=
=p68v
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: A Strange Networking Setup

2006-11-02 Thread Leonid Grinberg

Do you also leave your front door open (not just unlocked), so that
someone can come take a piss in your bathroom and maybe read your
mail and take your TV while you're at work?


See, it does not really hurt me if they use my network, other than
bandwidth. That is why I want to be able to monitor what they are
using -- to make sure that they are not *ab*using it.

But you know what? Screw it, this is stupid. I am just going to secure
the thing and get it over with!


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: A Strange Networking Setup

2006-11-02 Thread srg krn

The best way to acomplish this is using ettercap on your linux box.
If the WRT is configured as a bridge (not a layer 3 router) between
wireless and LAN you can do the following.
With ettercap you can do that the wireless client thinks that the MAC
addr of the router is the MAC addr of your linux machine.
In the other hand (while running ettercap) the packets arriving to
your linux machine with the dst mac addr of your linux machine (but
destinated to another ip) will be forwarded (layer 2 forward) to the
real router.

Done this, you can happily sniff all the traffic that is going
to/from the wireless client.

IT IS VERY EASY TO USE ETTERCAP.

If you want more detailed info google for a document from the SANS
institute called an ettercap primer.

Hope this helps

Regards


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: A Strange Networking Setup

2006-11-02 Thread Pollywog
On Thursday November 2, 2006 8:32 pm, Leonid Grinberg wrote:
  Do you also leave your front door open (not just unlocked), so that
  someone can come take a piss in your bathroom and maybe read your
  mail and take your TV while you're at work?

 See, it does not really hurt me if they use my network, other than
 bandwidth. That is why I want to be able to monitor what they are
 using -- to make sure that they are not *ab*using it.

 But you know what? Screw it, this is stupid. I am just going to secure
 the thing and get it over with!

Now you get the idea  :)
It's better than leaving the door open and then wondering what people are 
doing when you are not looking.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



A Strange Networking Setup

2006-11-01 Thread Leonid Grinberg

Hello all,

I am currently running a Linksys WRT54G server with the factory
firmware. I have set it up to use wireless. I have purposefully not
encrypted or protected the WAP because i want others to be able to use
it if they want to (doing my part for society and all that). I do,
however, look at the DHCP client logs and almost all the time, I see
some computer called ussvoyager, which is not mine.

I would like to be able to see what this computer is sending (just in
case). I figure that if I am going to run a non-secure AP, I may as
well do that, anyways. The problem is that I want something better
than what comes on the router in terms of port sniffing. Ideally, I
would love for the router to redirect all traffic to my Debian server
(Etch), so that I can analyze it using Wireshark. What would be the
best way of going about doing this?

Thanks in advance!

--
Leonid Grinberg


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: A Strange Networking Setup

2006-11-01 Thread Julian De Marchi
Take advantage of the DMZ option the router offers you. using this it
should redirect all traffic to the DMZ. Another option would be to put
linux on the router. OpenWrt is a good choice, or DD-WRT i think is
another alternative. I have succesful placed open-wrt on my asus router
and it works like a charm.

-- 
Regards,

Julian De Marchi
JD Computer Hosting

---

WWW: http://hosting.jdcomputers.com.au
Support: [EMAIL PROTECTED]
Sales: [EMAIL PROTECTED]

On Thu, November 2, 2006 1:26 pm, Leonid Grinberg said:
 Hello all,

 I am currently running a Linksys WRT54G server with the factory
 firmware. I have set it up to use wireless. I have purposefully not
 encrypted or protected the WAP because i want others to be able to use
 it if they want to (doing my part for society and all that). I do,
 however, look at the DHCP client logs and almost all the time, I see
 some computer called ussvoyager, which is not mine.

 I would like to be able to see what this computer is sending (just in
 case). I figure that if I am going to run a non-secure AP, I may as
 well do that, anyways. The problem is that I want something better
 than what comes on the router in terms of port sniffing. Ideally, I
 would love for the router to redirect all traffic to my Debian server
 (Etch), so that I can analyze it using Wireshark. What would be the
 best way of going about doing this?

 Thanks in advance!

 --
 Leonid Grinberg


 --
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact
 [EMAIL PROTECTED]





-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: A Strange Networking Setup

2006-11-01 Thread Zoran Kolic
 I am currently running a Linksys WRT54G server with the factory
 firmware. I have set it up to use wireless. I have purposefully not
 encrypted or protected the WAP because i want others to be able to use
 it if they want to (doing my part for society and all that). I do,
 however, look at the DHCP client logs and almost all the time, I see
 some computer called ussvoyager, which is not mine.

You have expected it, don't you?

 I would like to be able to see what this computer is sending (just in
 case).

Why?

 The problem is that I want something better
 than what comes on the router in terms of port sniffing. Ideally, I
 would love for the router to redirect all traffic to my Debian server
 (Etch), so that I can analyze it using Wireshark. What would be the
 best way of going about doing this?

Ask the man. He lives somewhere around.
Those routers have logs. Configure it
and take a look into it, if you really
want.
For the sake of truth (kh-kh), you would
need man-in-the-middle. Depending of
version of your linksys, you could install
open system. wrt54gl is linux based and
much better in this meaning.
But, you could find ip address of this box.
Why you need to interact with router?
You are both on the same subnet, local
addresses. Ussvoyager is all yours, if you
know what to do.

Zoran



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]