+ Post New Thread
Page 2 of 2 FirstFirst 12
Results 16 to 22 of 22
Wireless Networks Thread, Wireless Hacking in Technical; Originally Posted by pcstru Slightly amusing aside, when I was out looking for them, I spotted some lads acting suspiciously ...
  1. #16
    cpjitservices's Avatar
    Join Date
    Jul 2010
    Location
    Hessle
    Posts
    2,421
    Thank Post
    508
    Thanked 282 Times in 258 Posts
    Rep Power
    81
    Quote Originally Posted by pcstru View Post
    Slightly amusing aside, when I was out looking for them, I spotted some lads acting suspiciously round one of the bike cages. They were trying to hack a combination padlock - so at least I can chalk up one hacker today!
    Nice one, i'm not 100% sure how you're going to be able to get the location exactly.

  2. #17

    CPLTD's Avatar
    Join Date
    Apr 2008
    Location
    Northamptonshire
    Posts
    4,043
    Thank Post
    1,395
    Thanked 644 Times in 500 Posts
    Blog Entries
    1
    Rep Power
    259
    Quote Originally Posted by pcstru View Post
    So we have some clever clogs who are attempting to hack our wireless network, which while unlikely to succeed, is causing our radius server some unnecessary work. We want to track them down.

    We have a Meru system and can see the AP they are using, so we know approximate location, we also have a MAC address - assuming it is not being spoofed. What tools can we use go the last few yards and collar the perpetrators?
    Have you looked at Airtight? I don't mean ripping out and replacing the Meru system, but adding the senor only AP's (which are cheap) as an overlay.

    Airtight Networks - Secure Cloud-Managed WiFi

    Chris

  3. #18


    Join Date
    May 2009
    Posts
    2,961
    Thank Post
    259
    Thanked 785 Times in 596 Posts
    Rep Power
    286
    To be honest, I'd ban the MAC before spending any money!

  4. #19
    TheRobins's Avatar
    Join Date
    Jan 2014
    Location
    Worcestershire
    Posts
    40
    Thank Post
    21
    Thanked 2 Times in 2 Posts
    Rep Power
    2
    Interesting read, how did you get on in the end?

  5. #20


    Join Date
    May 2009
    Posts
    2,961
    Thank Post
    259
    Thanked 785 Times in 596 Posts
    Rep Power
    286
    I set up a laptop with ubuntu to run Kismet and ... they stopped!

  6. #21

    CHR1S's Avatar
    Join Date
    Feb 2006
    Location
    Birmingham
    Posts
    4,489
    Thank Post
    1,575
    Thanked 479 Times in 302 Posts
    Rep Power
    215
    Anyone with a working knowledge of Backtrack would know how to spoof their MAC, would know what can and cant be hacked and would at least attempt to cover their tracks.

  7. #22
    Sheridan's Avatar
    Join Date
    Oct 2010
    Posts
    1,289
    Thank Post
    112
    Thanked 86 Times in 58 Posts
    Rep Power
    28
    I use MAC filtering on top of radius to try and minimize this kind of thing. Obviously I don't have a BYOD wireless system yet!

    Its does require maintenance but at least you're putting a first line of defence in, not exactly rock solid but it slows down the lazy hacker!

SHARE:
+ Post New Thread
Page 2 of 2 FirstFirst 12

Similar Threads

  1. How to secure a wireless network against hacking attempts?
    By Thelps in forum Wireless Networks
    Replies: 7
    Last Post: 22nd January 2013, 01:29 PM
  2. Wireless ... Give me your brains
    By ajbritton in forum Wireless Networks
    Replies: 36
    Last Post: 25th October 2005, 07:47 AM
  3. Fujitsu Seimens Amil Pro 2010 Wireless
    By Mango_RW in forum Hardware
    Replies: 11
    Last Post: 27th September 2005, 07:54 AM
  4. Wireless signal Levels
    By ChrisH in forum Wireless Networks
    Replies: 2
    Last Post: 19th July 2005, 09:08 AM

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •