Re: A Strange Networking Setup
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 11/01/06 21:26, Leonid Grinberg wrote: Hello all, I am currently running a Linksys WRT54G server with the factory firmware. I have set it up to use wireless. I have purposefully not encrypted or protected the WAP because i want others to be able to use it if they want to (doing my part for society and all that). I do, Do you also leave your front door open (not just unlocked), so that someone can come take a piss in your bathroom and maybe read your mail and take your TV while you're at work? - -- Ron Johnson, Jr. Jefferson LA USA Is common sense really valid? For example, it is common sense to white-power racists that whites are superior to blacks, and that those with brown skins are mud people. However, that common sense is obviously wrong. -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.5 (GNU/Linux) iD8DBQFFShXTS9HxQb37XmcRAqAYAKCRYT9pRBpW9ttiBVbH4Ora1bz6zwCgpJEh q7UNFTUrZxtrpWxx9CO7XJk= =p68v -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Re: A Strange Networking Setup
Do you also leave your front door open (not just unlocked), so that someone can come take a piss in your bathroom and maybe read your mail and take your TV while you're at work? See, it does not really hurt me if they use my network, other than bandwidth. That is why I want to be able to monitor what they are using -- to make sure that they are not *ab*using it. But you know what? Screw it, this is stupid. I am just going to secure the thing and get it over with! -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Re: A Strange Networking Setup
The best way to acomplish this is using ettercap on your linux box. If the WRT is configured as a bridge (not a layer 3 router) between wireless and LAN you can do the following. With ettercap you can do that the wireless client thinks that the MAC addr of the router is the MAC addr of your linux machine. In the other hand (while running ettercap) the packets arriving to your linux machine with the dst mac addr of your linux machine (but destinated to another ip) will be forwarded (layer 2 forward) to the real router. Done this, you can happily sniff all the traffic that is going to/from the wireless client. IT IS VERY EASY TO USE ETTERCAP. If you want more detailed info google for a document from the SANS institute called an ettercap primer. Hope this helps Regards -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Re: A Strange Networking Setup
On Thursday November 2, 2006 8:32 pm, Leonid Grinberg wrote: Do you also leave your front door open (not just unlocked), so that someone can come take a piss in your bathroom and maybe read your mail and take your TV while you're at work? See, it does not really hurt me if they use my network, other than bandwidth. That is why I want to be able to monitor what they are using -- to make sure that they are not *ab*using it. But you know what? Screw it, this is stupid. I am just going to secure the thing and get it over with! Now you get the idea :) It's better than leaving the door open and then wondering what people are doing when you are not looking. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
A Strange Networking Setup
Hello all, I am currently running a Linksys WRT54G server with the factory firmware. I have set it up to use wireless. I have purposefully not encrypted or protected the WAP because i want others to be able to use it if they want to (doing my part for society and all that). I do, however, look at the DHCP client logs and almost all the time, I see some computer called ussvoyager, which is not mine. I would like to be able to see what this computer is sending (just in case). I figure that if I am going to run a non-secure AP, I may as well do that, anyways. The problem is that I want something better than what comes on the router in terms of port sniffing. Ideally, I would love for the router to redirect all traffic to my Debian server (Etch), so that I can analyze it using Wireshark. What would be the best way of going about doing this? Thanks in advance! -- Leonid Grinberg -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Re: A Strange Networking Setup
Take advantage of the DMZ option the router offers you. using this it should redirect all traffic to the DMZ. Another option would be to put linux on the router. OpenWrt is a good choice, or DD-WRT i think is another alternative. I have succesful placed open-wrt on my asus router and it works like a charm. -- Regards, Julian De Marchi JD Computer Hosting --- WWW: http://hosting.jdcomputers.com.au Support: [EMAIL PROTECTED] Sales: [EMAIL PROTECTED] On Thu, November 2, 2006 1:26 pm, Leonid Grinberg said: Hello all, I am currently running a Linksys WRT54G server with the factory firmware. I have set it up to use wireless. I have purposefully not encrypted or protected the WAP because i want others to be able to use it if they want to (doing my part for society and all that). I do, however, look at the DHCP client logs and almost all the time, I see some computer called ussvoyager, which is not mine. I would like to be able to see what this computer is sending (just in case). I figure that if I am going to run a non-secure AP, I may as well do that, anyways. The problem is that I want something better than what comes on the router in terms of port sniffing. Ideally, I would love for the router to redirect all traffic to my Debian server (Etch), so that I can analyze it using Wireshark. What would be the best way of going about doing this? Thanks in advance! -- Leonid Grinberg -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED] -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Re: A Strange Networking Setup
I am currently running a Linksys WRT54G server with the factory firmware. I have set it up to use wireless. I have purposefully not encrypted or protected the WAP because i want others to be able to use it if they want to (doing my part for society and all that). I do, however, look at the DHCP client logs and almost all the time, I see some computer called ussvoyager, which is not mine. You have expected it, don't you? I would like to be able to see what this computer is sending (just in case). Why? The problem is that I want something better than what comes on the router in terms of port sniffing. Ideally, I would love for the router to redirect all traffic to my Debian server (Etch), so that I can analyze it using Wireshark. What would be the best way of going about doing this? Ask the man. He lives somewhere around. Those routers have logs. Configure it and take a look into it, if you really want. For the sake of truth (kh-kh), you would need man-in-the-middle. Depending of version of your linksys, you could install open system. wrt54gl is linux based and much better in this meaning. But, you could find ip address of this box. Why you need to interact with router? You are both on the same subnet, local addresses. Ussvoyager is all yours, if you know what to do. Zoran -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]