There Are Many Reasons Why You Want To Check If An Unauthorized Person Uses Your Wireless Network. It May Be That You Have A Slower Than Normal Or Just Do Not Want Anyone Getting A Free Ride While You Pay The Bill. Of Course, There Are Security Implications If That Person Can Access Files On The Network In Some Way, Even If You Use Your Legal Connection To Piracy Or Other Illegal Activities Implications.
Whatever The Case, It Is Best To Stay On The Safe Side. Many Of You Have Already Taken Some Basic Precautions To Configure Your Wireless Network And How Everything Works To Solve These Problems. This Short Guide Is Intended Primarily For Novice Users Who Need A Helping Hand To See If, In Fact, Your Wi-Fi Is Stolen.
Check The Devices Associated With Your Router
The First Thing To Do Is Log On To The Management Console By Typing The Router's IP Address Directly Into The Address Bar Of The Browser - Typically 192.168.0.1 Or 192.168.1.1 Depending On What Router You Have.
Alternatively, If You're On A Mac, You Can Find The Default IP Address, Go To Preferences Network System. It Should Be Listed Next To "Router" If You Are Using Ethernet, Click On "Advanced ..." And Go To The "TCP/IP" Tab If You Are Using Wi-Fi. Then Point Your Browser To The URL And Enter Your Login Information - If You Have Not Changed The Default Settings, Should Be A Combination Of "Admin" And "password" Or Blank Fields.
Once Inside The Look Of Your Administrative Console Of The Router To A Section On The Connected Devices Or Wireless Status. In My Old Dir-655 D-link Is Available Status> Wireless But Finding That "Attached Devices" On Netgear Routers As DHCP Clients Table In Linksys Routers, "Device List" If You Use The Firmware Tomatoes, And So On.
Dhcp Client List Examples On D-link And Linksys Routers |
This Should Provide A Table With The IP Address, Mac Address And Other Details Of Each Device Connected To The Router. Check The List Against Your Team To Find The Intruder. You Can Find The Mac/IP Teams That Go To The Command Prompt And Re-enter "Ipconfig/All" Address. The Mac Address Is Listed As The Physical Address. I Let You Discover For Mobile Devices Such As Smart Phones And Media Players And I Can Not List All Options.
Taking Action
The Best And Easiest Solution Is To Create A Password Using WPA2 Or WPA -- WEP Is Easy To Crack To Avoid That If Possible. There Are Other Methods You Can Use To Improve Safety, Such As Turning Off SSID Broadcast (If You Can Not Announce The Name Of The Network Nearby Wi-Fi Devices) Or Define A Filter For Devices Allowed Or Blocked By Address.
This Should Be More Than Enough For Most Users, But If You Need To Find Out Who Was Really Into Your Network, It Is Possible To Accurately Determine Their Physical Location Using A Tool Called Moocherhunter. You Will Need To Record A Live CD To Boot Your Laptop/Computer And Walk To Locate Unauthorized Wireless Customers. According To The Description, Which Detects The Traffic Sent By The Network And Can Find The Source Within Two Meters Of Precision.
Needless To Say, We Do Not Suggest That You Take Things In Hand, But Could Be Useful If Someone Gets Into Trouble With The Authorities Of Using Its Network For Illegal Purposes - Or Just Have A Story To Tell Costs.
0 comments:
Post a Comment