802.11b Network Scanning In London And Amsterdam 134
jbrw writes: "Beware of cat skulls in sombreros! Bicycle + laptop + gps unit + 80I.11 magic = WarPeddlaz, currently scanning London. Replacing the bike with a canal boat, and you have the WarFloataz in Amsterdam. Pics, info and raw scan data available at free2air.org." Some amusingly altered photos in here, too. Now that I have an 802.11 card working, this is getting even more interesting.
Slashdotted already? (Score:1)
Re:Slashdotted already? (Score:3, Redundant)
Re:Slashdotted already? (Score:1)
We caught the deluge pretty quickly & we're tuning the host as best we can. Please bear with us.
free2air.org
Re:Slashdotted already? (Score:1)
Pseudo example:
802.11b Network Scanning In London And Amsterdam
Posted by timothy [monkey.org] on Sat Sep 15, '01 11:21 AM
from the brief-window-of-opportunity dept.
jbrw [mailto] writes: "Beware of cat skulls in sombreros! Bicycle + laptop + gps unit + 80I.11 magic = WarPeddlaz, currently scanning London. Replacing the bike with a canal boat, and you have the WarFloataz in Amsterdam. Pics, info and raw scan data available at free2air.org [free2air.org] slashcached [slashdot.org]." Some amusingly altered photos in here, too. Now that I have an 802.11 card working, this is getting even more interesting.
Re:Slashdotted already? (webcache) (Score:1)
Unfortunately, it didn't work in this case. I've got a read-ahead public archived webcaching system, through junkbuster/squid, that I'm making public shortly.
I put a cache injector for foreign URL's on slashdot. Every 5 minutes, a ruby script checks for un-cached websites, and tries to browse them. This throws it into my read-ahead caching system, which is archived at http://www.webcache.org/
Unfortunately, this site was dead within 5 minutes, so it couldn't get injected. One solution is almost here, it's not just fully tweaked yet
Re:Slashdotted already? (Score:1)
mod parent up (Score:1)
Re:Slashdotted already? (Score:2)
Re:god you are a retard bradleyjay (Score:1)
Hosting system (Score:2)
Free 802.11 Networks (Score:5, Interesting)
Shortly after I set it up, I found a guy using my network via the wireless access point. At first, I was fine with it, but I realized quickly that this wasn't some guy passing on a bike, but rather someone in the same apartment building.
I tracked him down, and told him that I wasn't in the business of providing free internet to the entire building. Now he pays half the DSL cost. Not a bad deal.
The point is this: I still leave my network open. Anyone wandering by is free to use my 802.11 network. In fact, the settings are such that anyone with a computer set up to connect to the local university's wiress network will get a connection here.
The lesson learned: keep your network open. Smile when some wandering soul conencts for a while. Unless you've got your own T3, though, you better make sure someone isn't getting free, continued, high speed internet, at your expense.
Possible Misuse (Score:5, Interesting)
Re:Possible Misuse (Score:1)
Re:Possible Misuse (Score:1)
The log would need to have the mac address. Even in that case would the feds believe you didn't change the hex values so it didn't look like your machine?
Re:Possible Misuse (Score:1)
The logging function logs all TCP/UDP traffic, the port, and the IP it was from, and to.
The DHCP function can pair MAC's to the IP's assigned, so with these two tools, I could trace things back.
So the Linksys BEFW11S4 has the functions necessary to trace things back. The only thing I wish it had was a "MAC address allow list", which is more useful than a "MAC address disallow list" thats in there now.
Re:Possible Misuse (Score:1)
Re:Possible Misuse (Score:1)
Re:Possible Misuse (Score:2)
I never considered how inconvenient a disallow list would be.
Re:Possible Misuse (Score:1)
I wonder how he tracked the guy down, by the way?
Re:Possible Misuse (Score:3, Informative)
It would be simple to set up an access point, leave it open, and sniff traffic of whoever connects. If nothing else, I'd think you could collect POP passwords pretty easily.
Re:Possible Misuse (Score:1)
preconnect 'ssh -C -f -L 20143:server:143 username@server sleep 5'
If I change 143 to 110, I've got pop tunneled instead.
Re:Possible Misuse (Score:1)
Even keeping log files might not be enough to resolve you of responsibility if someone were to use your connection for a malicious attack on someone else using your access point and IP. If it got traced back to you, would having log files be an adequate defense?
"There was a ddos attack carried out yesterday that appears to have been controlled from your DSL IP"
"Oh, I looked through my logs and it looks like someone connected through my wireless access gateway at the time this happened. Here is the info..."
"That's nice, but _why_ are you leaving this open for anyone passing by to use? I'm afraid you had better come with us to answer more questions. Oh, by the way... we had better take any computers and networking equipment you have with us in case we need it later for evidence. Oh, don't worry... you'll get it all back when we are done with our investigation. *chuckle*"
It is a shame, but the potential exposure would probably make this problematic for a lot of people, myself included.
Re:Free 802.11 Networks (Score:2)
802.11 is bad idea in an apartment complex.
Re:Free 802.11 Networks (Score:1)
Here's something important to look out for. Because I've been getting my network "broadband ready", I run my Linksys behind an autodialing Linux firewall with a 56k modem. I run extremely tight rules on the firewall, too, and just the other day I logged some packets from my network behind my Linksys hitting my oustide firewall with the **protected network** IP network address!
My setup is 56k ppp -> Linux (192.168.2) --xover--> Linksys WAN port --> hub port (192.168.1 w/DHCP) --> 24 port hub
I should *NEVER* see 192.168.1 packets going OUT of the Linksys and hitting the eth0 on my outside firewall, but sure enough.. I logged a few the other day.. they were destined for junkbuster and squid. I'm glad I have the firewall logging anomalies like that or I would never have known.
Luckily the outside firewall stopped the malformed packets from getting out to the net. And no I don't care that much about it on a ppp link, but the cable modem is coming and I don't want my internal network structure revealed on the Internet side.
Re:slashdot counter-measures implemented? (Score:1)
The site is hosted on an IBM laptop at the end of a DSL line.
Re:slashdot counter-measures implemented? (Score:3, Informative)
We're juggling like made here at the moment. Just opening up the firewall a touch so we can move the database on to a beefier machine.
I guess we'll add to our woes by posting some of the traffic graphs once it's calmed down a little.
GOOGLE Cache To THe Rescue (Score:1, Informative)
For all the copy and pasters:
http://www.google.com/search?q=cache:ueiKCTXUjOc:w ww.free2air.org/+&hl=en
Re:GOOGLE Cache To THe Rescue (Score:1)
Re:GOOGLE Cache To THe Rescue (Score:1)
/me spanks self
Frankfurt, GE Sniffer (Score:2)
I have the Sniffer 4.6 Wireless on my laptop, if anyone who lives in the Frankfurt area and whats to check it out, give me a shout at kruczkowski@hotmail.com (English please
Anti-slashdotting setup perchance? (Score:5, Interesting)
Slashdot should organise with Google to cache the page as they approve a post. Google grabs the site before the hoards and next to the real link
Re:Anti-slashdotting setup perchance? (Score:1)
Re:Anti-slashdotting setup perchance? (Score:1)
Re:Anti-slashdotting setup perchance? (Score:2)
Slashdot likes to think it carries breaking news, and thus the versions in the google cache would be stale. Organizing it with google would just drag google into the lawyers' liability game.
Re:Anti-slashdotting setup perchance? (Score:1)
In a sane world caches be fair use... maybe they are, but lets let the NYT, Google & Yahoos of the world spend their lawyerly dollars on the eventual lawsuits.
I'll go send a few $$ to the ACLU & EFF now, they'll need it for more important things though.
Scanning Cities (Score:1)
I recently did a wireless scan of Downtown Los Angeles. Found 47 access points in the core area - only about 8 were using any kind of encryption.
I couldn't believe it. I keep wondering if these numbers are a result of 1) altruism 2) ignorance 3) laziness or some combination of the above.
As an aside - what are the best wireless scanning apps for linux?
Re:Scanning Cities (Score:2)
Or, it could be 4) other security measures. The wireless netrwork here does not use link-level (WEP) encryption becuase it has been shown to be fundamentally broken many, many times. Instead, in order to get out of the wireless network you have to establish a VPN tunnel. And that kind of setup wouldn't be apparent to someone just scanning for networks.
Re:Scanning Cities (Score:1)
I have seen instances where a "rouge" group of developers found it more productive to work in the board room (it has a great whiteboard) and there were not enough jacks for there puters, their manager put in a request for a new hub, got approved and sent a developer out, he came back with an some wap gear, the admin nearly shot the manager when he found out.
Success of a free network (Score:1, Interesting)
One question: Where does the revenue come from? I imagine that nobody is going to give away bandwidth, and that it would be difficult to force banner ads onto the public to pay for it.
Perhaps if they cached the web and inserted their own banners in the pages, that would genereate some money. But would it be enough? Caching napster traffic to conserve bandwidth would not be a daunting task, and scalability of the networks would also create a problem. How many nodes will 802.11b support, and how much additional equipment would be needed to expand the network would have to be addressed all but immediately.
I'm not saying it wouldn't work, I'm just saying it would be hard to make any money off of it.
Angry White Guy
Re:Success of a free network (Score:1)
My setup is my DSL modem is connected a linux firewall/router. I then connect my hub for my wired LAN to the router, and the access point. That way, I maintain security on my LAN, and provide free 'net acess to neighbors and people driving down the street. If I need to, I can even limit the bandwidth to the access point.
Right now, I'm working on setting up a free, unified wireless network in the Chicago area [digital-moose.com]. Let me know if you want to help out!
Security and 802.11b (Score:1)
Re:Security and 802.11b (Score:1)
I'm not sure about wireless NICs, but normally you can adjust the MAC-address as you like.
The production of a NIC is cheaper this way,
so I'd guess, the wireless NICs have the same feature/bug.
Re:Security and 802.11b (Score:1)
The SMC basestation doesn't even need a password to setup.
Re:Security and 802.11b (Score:1)
You knew it was coming sooner or later.
Sad part is, even I laffed at it myself when I said it...a true running gag.
Moose
Copenhagen (Score:1)
Improving 802.11b security (Score:3, Informative)
People may find my wireless LAN -- they may even DHCP an IP address from it, but they won't be able to actually do anything once they do. :-)
It's all about the cheapness (Score:2)
When I bought my access point, I got the absolute cheapest one I could find; of course it only has useless 40-bit WEP and the configuration utility only runs on Windows (which I don't have). But I'm not worried about people freeloading; I just turn it off when I'm not using it.
Re:It's all about the cheapness (Score:2)
Idea for other bicycle project... (Score:2)
(Just an idea, maybe one day I'll get a PDA with GPS and a digital camera and try it out. But the kit seems a bit expensive at the moment.)
Re:Idea for other bicycle project... (Score:1)
Re:Idea for other bicycle project... (Score:1)
Re:Idea for other bicycle project... (Score:1)
Re:Idea for other bicycle project... (Score:1)
Terms & Conditions (Score:2, Insightful)
You are responsible for what happens on your connection. If somebody uses your connection for something nasty (accessing illegal material, etc) then you could be in trouble.
I've been dying to go wireless, but I need to be sure that I *can* keep it secure.
Freely shared wireless networks are a lovely ideal, but be careful you don't get burned. Check your ISPs Terms and Conditions.
Paranoid Pete.
Apple airport (Score:2)
Re:Apple airport (Score:1)
War blading! (Score:1)
- a handheld or a wearable
- retinal display for it
- a compact 802.11b receiver
And... Time to clean up my rollerblades!
screwed link (Score:1)
Client-side 802.11 converter (Score:1)
has anyone seen a device that will convert a single PC to wireless that absolutely cannot otherwise be converted? I have a small mainframe at home that's really an S/390 chip on a Microchannel card (IBM all the way, baby
I'm looking for an access point-sized device that will just be a client side relay for one or more PCs connected to it. Has anyone heard of such a thing? Thanks..
Re:Client-side 802.11 converter (Score:1)
http://www.apple.com/airport/ [apple.com]
Alternately, any of the firewall/NAT/router/wireless home access boxes would do as well.
Re:Client-side 802.11 converter (Score:1)
Unless I didn't catch something on the airport page stating that the airport can be converted to a client device instead of an access point. I don't need another access point, though. Thanks again for trying to help.
Re:Client-side 802.11 converter (Score:1)
Robert
Re:Client-side 802.11 converter (Score:1)
I haven't looked for the Cisco, with their history of "corporate pricing". I don't even wanna know
Thanks!
WEP and Mac address restricting. (Score:1)
Only cryptographic spreading will do (Score:1)
here in Amsterdam. I was going to set up a system,
but realised when my reccomendation to 'spread' in
a cryptographic way was not taken, interest was
lost.
Understandably, governments are scared of losing
their ability to 'license' the airwaves. However,
in the USA, there is an effort to get the FCC to
go along. Too bad for those that paid $Billions
to get their third generation phones some
spectrum. It is because of this, it will flop.
As far as WEP goes, it was an obvious joke from
its inception. We call it "Weak Encryption
Protocol" here in A'dam. The bandwidth of 802.11b
is only 11Mbit/s half duplex max, so it wouldn't
be all that bad to set up something. I am mostly
concerned with the privacy of those that use the
systems I maintain.
As far as people using parts of the Internet, I
feel that "surfing the web" and getting mail and
all "Internet" cafe functions should be free. Here
you just need to go to the public library if you
need access. You get a Windoze box, but you can
download "Putty" or a similar SSH program and have
use of your own box. Bandwidth is fair and better
than ADSL or cable at the library.
Furthermore, if i travel anywhere and school is in
session, no university has ever denied me use of
their Internet, and often, I get a Unix terminal!