[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y ] [Search | Free Show | Home]

>Unknown MAC address shows up in your router network

This is a blue board which means that it's for everybody (Safe For Work content only). If you see any adult content, please report it.

Thread replies: 96
Thread images: 18

File: 1456621427070.png (551KB, 964x912px) Image search: [Google]
1456621427070.png
551KB, 964x912px
>Unknown MAC address shows up in your router network
>>
Forgot to add

>Android Operating System
>You only have 1 Android phone in your home
>>
>>59149082
>frogposting
>>
>>59149082
>MAC
Found your problem.
>>
>MAC addresses show up in router log
>only have PCs
>>
File: 645325456.png (66KB, 800x1000px) Image search: [Google]
645325456.png
66KB, 800x1000px
>Windows 10
>Mysterious phone appears on your network device list
>>
>>59149082
hahahahahahahahahahahhahaa
macfag.
>>
>>59149082
You forgot to turn that easy wi-fi authentication shit off.
>>
>>59150205
>>59149721
>>59151472
Stop it guys, this joke is not funny.
>>
>>59151539
Are you talking about WPS Settings?

Because that is disabled.
>>
File: 1475625737612.jpg (131KB, 525x809px) Image search: [Google]
1475625737612.jpg
131KB, 525x809px
>10367 failed ssh login attempts on your vps
>>
>>59149082
Congratulations, your password is in a dictionary
>>
File: kek.jpg (77KB, 600x536px) Image search: [Google]
kek.jpg
77KB, 600x536px
>he hasn't enabled mac filtering on his router
>>
>>59151933
He really didn't have to refer to the MAC address.
>>
File: 19.png (348KB, 540x600px) Image search: [Google]
19.png
348KB, 540x600px
>>59152055
Not anymore, I already changed my password and now it is TWO DICTIONARY WORDS mashed together.
>>
>>59149118
>implying it's android
>>
>>59152060
>He thinks that this can't be easily defeated
>>
File: made me look.png (27KB, 513x545px) Image search: [Google]
made me look.png
27KB, 513x545px
How many devices on your network right now /g/ents?
>>
File: image.jpg (12KB, 240x240px) Image search: [Google]
image.jpg
12KB, 240x240px
>>59152050
>10367 failed ssh login attempts on your vps this week
>they're all your login attempts
>>
>>59152245
>posting your device mac addresses
You've fucked up.
>>
>>59152272
Kek
>>
File: 1344904748637.jpg (17KB, 219x219px) Image search: [Google]
1344904748637.jpg
17KB, 219x219px
If I turn the Wi-Fi off they can't hack me
>>
>>59152276
this
prepare to be h4xd
>>
>>59152060
some D-Link routers don't have that function
>>
Is there a way to get all hostname and Mac address connected without accessing the router?
>>
File: fucking_nope.gif (962KB, 300x168px) Image search: [Google]
fucking_nope.gif
962KB, 300x168px
>>59149082
>the mouse pointer moves by itself
>>
>>59152550
arp -a
>>
>>59152060
>He thinks mac filtering is a security measure.

LMAO, I bet you also fell for the change SSH to a different port meme.
>>
>>59152245
>IPv4

lel
>>
>>59152595

>Port 22
>1000 chink IP attempts per second

>Port 2323
>0 attempts

Hmmmmmm
>>
File: 1480376287668.jpg (12KB, 250x250px) Image search: [Google]
1480376287668.jpg
12KB, 250x250px
>new mac address shows up on router's wifi connections
>panic and block it
>new printer stops working
>they must have already penetrated my network
>>
>>59149082
Heh, it was a part of my plan
>>
>>59149082
All routers are manufactured in China, so expect the firmware to be backdoored and bugged to hell.
>>
>>59152616
That's why you build your own senpai.
>>
>>59152609
>Implying any of those 1000k chink bots were a threat.

Competent people are the ones you should be worried about.
>>
>>59149082
>hidden SSID
>whitelisting macs
>wpa-psk
>wireless turned off when I'm not using it
>>
>>59152096

Wow, a whole two of em.
>>
>>59152798
>hidden SSID
doesn't do shit
>whitelisting macs
doesn't do shit
>wireless turned off when I'm not using it
makes it even easier to capture the handshake
>>
>>59152894
>>hidden SSID
stops you being a target
>>whitelisting macs
makes it so they have to sniff and spooof mac
>>wireless turned off when I'm not using it
true but also makes it unstable to the point they'll hack someone elses

my goal isn't to make it unhackable it's to make it such an inconvenience they'll go for someone else
>>
>>59152573
Doesn't work only shows my gateway
>>
> hidden ssid behind own router
> don't even remember admin pass to ap
>>
>>59152843
>171,476 words in use in English dic
>171,476*171,476
>= 29404018576 combinations of passwords possible
Make it 5 (diceware) and dictionary doesn't matter.
>>
>>59152987
>Make it 5 (diceware) and dictionary doesn't matter.

Oh sure, but he said two. Five is a lot more secure than two due to the length (and thus entropy.)

For example, take two random words as I did and run them on https://password.kaspersky.com/

I chose 'croak' and 'storing' and combined them into one password. The site says these are common words -- a single Macbook Pro would take 10 months to break it. The conficker botnet would take 23 minutes with the Tianhe supercomputer taking 9 seconds.

The moral is, five words is probably a minimum.
>>
>>59152987
That's not alot desu
>>
>>59151453
>E D G E
>D
>G
>E
>>
File: 1462500630305.jpg (115KB, 780x720px) Image search: [Google]
1462500630305.jpg
115KB, 780x720px
>rename my open Wi-Fi to "$11.99/minute"
>the neighbors stop using it
>>
>>59151933
le macfag is mad
>>
>>59152550
>>59152940
nmap, you can run an ARP or ping scan.
>>
>>59153563
Just remember to run nmap as root to see all the information.
>>
>>59149082
MACFAGS REEEEEEEEEEEEEEEEEEEEEEE
>>
>first day of CS classes
>prof is using something called "emacs"
>stand up
>call him a macfag
>walk out
>>
File: 1406084792406s.jpg (3KB, 125x90px) Image search: [Google]
1406084792406s.jpg
3KB, 125x90px
>>59149721
>>
>>59153540
le redditor is shitposting
>>
>>59153563
this is nice, I got the live hosts, but how to get the hostname?`
>>
>>59152931
>>>hidden SSID
>stops you being a target

Why?
Only makes you more interesting - "what is the n00b trying to protect?"

But a far bigger problem:
When not in range it causes your mobile phone to try to log into any hidden WiFi, so it's really easy to set up a generic honey trap for all the fools who use a hidden SSID.
>>
>>59154270
I think the hostname you find in a routers status log(like android-<some hash>, foo-iphone or bar-PC) is sent by the client when doing DHCP.

I think you would need a sniffer running while the client does that.
>>
>>59154374
Not only this, but with a hidden SSID all your wireless devices broadcast the SSID instead of one single router/AP, covering a much larger area and thus making everything more vulnerable.
>>
>>59154463

im trying dhcpdump
dhcp requests is visisble to other hosts in the network right?

I can see when my phone is requesting for dhcp address from my laptop?
>>
File: Clipboard02.png (1KB, 448x22px) Image search: [Google]
Clipboard02.png
1KB, 448x22px
>hostname localhost
>>
>>59154566
On a wireless network you can see all the traffic, you don't need a specialized sniffer you can use Wireshark or tcpdump. Make sure your network interface is in promiscuous mode.

You can also do it completely offline, without associating with network at all wire airodump-ng/airdecap-ng(assuming you know the key).

With the aircrack suite you might be able to disconnect a client, which will automatically reconnect and you may get the DHCP information.
>>
>>59154566
Nvm yep it works. but I still need to record the mac address and hostname separately

gonna need to script this
>>
>hard reset your router
>someone is already using your connection
>>
>>59154677
Oh nice... the deauth trick is pretty neat.
>>
File: g_just_another_b.png (51KB, 701x452px) Image search: [Google]
g_just_another_b.png
51KB, 701x452px
>>59149082
Quality thread.
>>
>>59152060
MAC filtering is a joke.
>>
>go on haveibeenpwned.com
> Oh no — pwned!
>Pwned on 21 breached sites and found 12 paste
>(subscribe to search sensitive breaches)
>>
>>59152613
Kek
>>
>>59152616
If you're not flashing stock firmware or not using a free as in freedom router, you need to leave
>>
>>59152245
Thanks for the MAC-addresses. I'm in your mainframe. You're fucked, kiddo.
>>
>>59154374
If you leave mobile wifi on when you leave your home network you deserve to be owned
>>
>>59152613
fckin kekkk
>>
Maybe you installed
Virtualbox or vmware
Firewall
Database
>>
>>59152613
I've actually done this before, kek.
>>
>>59152245
>posts all the IPs
Enjoy getting hacked, moron.
>>
>>59152245
Im ddosing and sql injecting 192.168.1.1

We have the same router btw
>>
>>59152613
this made me laugh so hard

i really hope it was real

also the picture sealed the post perfect
>>
>>59152613
Holy fucking lol
>>
>>59152245
>192.168.1.1
hey that's MY IP! are you HACKING me?
>>
File: cool guy.jpg (119KB, 600x600px) Image search: [Google]
cool guy.jpg
119KB, 600x600px
>>59156257
>>59155414
>>59155383
>>
>>59152613
shit dude call the fbi
>>
File: capture.png (78KB, 949x752px) Image search: [Google]
capture.png
78KB, 949x752px
>>59155302
Actually yes, I have Virtualbox installed.
>>
>>59149721
noice bait
>>
>>59152245
>192.168.X.X
>Not using 10.0.X.X
>>
>>59152613
Fuckin been there
>>
>>59159289
30 or so over 5 vlans
>>
>>59159403
>Software defined networking

Garbo
>>
>>59159419
right, because vlans arent used literally everywhere.
>>
>>59149082
I'm not worried because a mac address is only hardware.

It takes software to do damage.
>>
>>59159289
>10.0.X.X

> Using a private class A for your home network

You're the kind of person who buys dog food when it's half off. Except you don't own a dog.
>>
>>59152550
for i in `seq 1 254` ; do arping -c 1 123.123.123.$i | grep reply
>>
>>59152384
Physical access means "I can crack this!"
>>
>>59152609
>1000 chink IP attempts
>900 are for user 'root'
>root login is not even enabled
>root doesn't even have a password
>other 200 are for users that either don't exist or system users where login is explicitly disallowed.

Even if they could correctly guess my username, I have password auth disabled.
>>
>>59156986
>bridged adapter
There you go
>>
>>59160202
Does not show host names but does show the MAC address
>>
>>59152050
This is why when you have a server you should block all foreign IPs from logging in and just block australia from even visiting. Fuck australia, I hate that stupid penal colony.
>>
>>59154113
Jek
Thread posts: 96
Thread images: 18


[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y] [Search | Top | Home]

I'm aware that Imgur.com will stop allowing adult images since 15th of May. I'm taking actions to backup as much data as possible.
Read more on this topic here - https://archived.moe/talk/thread/1694/


If you need a post removed click on it's [Report] button and follow the instruction.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com.
If you like this website please support us by donating with Bitcoins at 16mKtbZiwW52BLkibtCr8jUg2KVUMTxVQ5
All trademarks and copyrights on this page are owned by their respective parties.
Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
This is a 4chan archive - all of the content originated from that site.
This means that RandomArchive shows their content, archived.
If you need information for a Poster - contact them.