Be careful that your wireless network isn't hacked. - Mercedes-Benz Forum

LinkBack Thread Tools Display Modes
post #1 of 5 (permalink) Old 05-24-2006, 07:19 PM Thread Starter
BenzWorld Senior Member
Date registered: Dec 2005
Posts: 483
Mentioned: 0 Post(s)
Quoted: 0 Post(s)
(Thread Starter)
Be careful that your wireless network isn't hacked.

Just out of curiosity, I took my laptop out for a drive around my neighborhood
to see how many wireless networks I could get into. I found ten in one hour in a mile radius of my house! Good thing i'm honest...

Locating a wireless network. There are two tools that are commonly used in this regard:

Network Stumbler a.k.a NetStumbler – This Windows based tool easily finds wireless signals being broadcast within range – A must have. It also has ability to determine Signal/Noise info.

Kismet – One of the key functional elements missing from NetStumbler is the ability to display Wireless Networks that are not broadcasting their SSID. As a potential wireless security expert, you should realize that Access Points are routinely broadcasting this info; it just isn’t being read/deciphered. Kismet will detect and display SSIDs that are not being broadcast which is very critical in finding wireless networks.

Attaching to the Found Wireless Network

Once you’ve found a wireless network, the next step is to try to connect to it. If the network isn’t using any type of authentication or encryption security, you can simply connect to the SSID. If the SSID isn’t being broadcast, you can create a profile with the name of the SSID that is not being broadcast. Of course you found the non-broadcast SSID with Kismet, right? If the wireless network is using authentication and/or encryption, you may need one of the following tools.

Airsnort – This is a very easy to use tool that can be used to sniff and crack WEP keys. While many people bash the use of WEP, it is certainly better than using nothing at all. Something you’ll find in using this tool is that it takes a lot of sniffed packets to crack the WEP key. There are additional tools and strategies that can be used to force the generation of traffic on the wireless network to shorten the amount of time needed to crack the key, but this feature is not included in Airsnort.

CowPatty – This tool is used as a brute force tool for cracking WPA-PSK, considered the “New WEP” for home Wireless Security. This program simply tries a bunch of different options from a dictionary file to see if one ends up matching what is defined as the Pre-Shared Key.

ASLeap – If a network is using LEAP, this tool can be used to gather the authentication data that is being passed across the network, and these sniffed credentials can be cracked. LEAP doesn’t protect the authentication like other “real” EAP types, which is the main reason why LEAP can be broken.

Whether you are directly connected to a wireless network or not, if there is wireless network in range, there is data flying through the air at any given moment. You will need a tool to be able to see this data.

Ethereal – Ethereal can scan wireless and Ethernet data and comes with some robust filtering capabilities. It can also be used to sniff-out 802.11 management beacons and probes and subsequently could be used as a tool to sniff-out non-broadcast SSIDs.

Protection Against These Tools

Just as it’s important to know how to utilize the aforementioned tools, it is important to know best practices on how to secure your Wireless Network Against these tools.

NetStumbler – Do not broadcast your SSID. Ensure your WLAN is protected by using advanced Authentication and Encryption.

Kismet – There’s really nothing you can do to stop Kismet from finding your WLAN, so ensure your WLAN is protected by using advanced Authentication and Encryption

Airsnort – Use a 128-bit, not a 40-bit WEP encryption key. This would take longer to crack. If your equipment supports it, use WPA or WPA2 instead of WEP (may require firmware or software update).

Cowpatty – Use a long and complex WPA Pre-Shared Key. This type of key would have less of a chance of residing in a dictionary file that would be used to try and guess your key and/or would take longer. If in a corporate scenario, don’t use WPA with Pre-Shared Key, use a good EAP type to protect the authentication and limit the amount of incorrect guesses that would take place before the account is locked-out. If using certificate-like functionality, it could also validate the remote system trying to gain access to the WLAN and not allow a rogue system access.

ASLeap – Use long and complex credentials, or better yet, switch to EAP-FAST or a different EAP type.

Ethereal – Use encryption, so that anything sniffed would be difficult or nearly impossible to break. WPA2, which uses AES, is essentially unrealistic to break by a normal hacker. Even WEP will encrypt the data. When in a Public Wireless Hotspot (which generally do not offer encryption), use application layer encryption, like Simplite to encrypt your IM sessions, or use SSL. For corporate users, use IPSec VPN with split-tunneling disabled. This will force all traffic leaving the machine through an encrypted tunnel that would be encrypted with DES, 3DES or AES.

Be careful!
starcar126 is offline  
Sponsored Links
post #2 of 5 (permalink) Old 05-25-2006, 02:21 AM
BenzWorld Veteran
conleycrew3's Avatar
Date registered: Nov 2005
Vehicle: Mercedes E200 black. Mercedes 300ce - sold.
Location: plymouth UK
Posts: 761
Mentioned: 0 Post(s)
Quoted: 0 Post(s)
Send a message via MSN to conleycrew3
i found this very usefull thanks!

(gets laptop out for some hacking fun lol)


merc 300 ce, amg bodykit, 17" amg alloys, lowered, Azul Azurite blue 98000 on the clock and two tone leather!!! (click a picture to see a larger image)
<a href='' target='_blank'><img src='' alt='Click to enlarge.'></a><a href='' target='_blank'><img src='' alt='Click to enlarge.'></a><a href='' target='_blank'><img src='' alt='Click to enlarge.'></a><a href='' target='_blank'><img src='' alt='Click to enlarge.'></a><a href='' target='_blank'><img src='' alt='Click to enlarge.'></a>
conleycrew3 is offline  
post #3 of 5 (permalink) Old 05-25-2006, 04:24 AM
Premium Member
ttaleric's Avatar
Date registered: Aug 2002
Vehicle: ML430
Location: SC,NC,GA,VA
Posts: 2,662
Mentioned: 0 Post(s)
Quoted: 0 Post(s)
Premium Member
Send a message via AIM to ttaleric
go ahead and try to mask your MAC address and get on my network, also make sure that you know the correct MAC addresses to mask.

1996 C220 SOLD
1999 ML430 SOLD
09 Nissan Titan 4x4 LE SOLD
12 F150 4x4 FX4
12 Ducati Streetfighter (street)
07 Yamaha R6 (track)
ttaleric is offline  
post #4 of 5 (permalink) Old 05-25-2006, 10:43 AM
Posts: n/a
Mentioned: Post(s)
Quoted: Post(s)
Jeez there must be like 5 or 6 wireless networks going on in my apartment building. I am using one cause I don't have a job yet.
It's so easy to be a parasite, I am lovin it!
post #5 of 5 (permalink) Old 05-25-2006, 02:03 PM
BenzWorld Veteran
WeVonBraun's Avatar
Date registered: Sep 2005
Vehicle: 1989w126
Location: Montreal
Posts: 708
Mentioned: 0 Post(s)
Quoted: 4 Post(s)
Originally Posted by GMISBEST.
Jeez there must be like 5 or 6 wireless networks going on in my apartment building. I am using one cause I don't have a job yet.
It's so easy to be a parasite, I am lovin it!

The guy you are hooking to can also read your network (your host in this case).
You should get your fire-wall to block all incoming traffic on your "stollen" connection.

If it's not possible to block with a firewall have windows to filter traffic on this adapter for only ports 80-443 that'll allow you to browse the net but not to be hacked by another parasite hooked on the same (back) bone.

-- wvb
WeVonBraun is offline  
Sponsored Links

  Mercedes-Benz Forum > General Mercedes-Benz Forums > Off-Topic

Quick Reply

Register Now

In order to be able to post messages on the Mercedes-Benz Forum forums, you must first register.
Please enter your desired user name, your email address and other required details in the form below.

User Name:
Please enter a password for your user account. Note that passwords are case-sensitive.


Confirm Password:
Email Address
Please enter a valid email address for yourself.

Email Address:


  • Currently Active Users Viewing This Thread: 1 (0 members and 1 guests)
    Thread Tools
    Show Printable Version Show Printable Version
    Email this Page Email this Page
    Display Modes
    Linear Mode Linear Mode

    Posting Rules  
    You may post new threads
    You may post replies
    You may not post attachments
    You may not edit your posts

    BB code is On
    Smilies are On
    [IMG] code is On
    HTML code is Off
    Trackbacks are On
    Pingbacks are On
    Refbacks are On


    Title goes here

    video goes here
    description goes here. Read Full Story
    For the best viewing experience please update your browser to Google Chrome