May 13th 2011 @5:34pm ( how to detect a wireless intruder )


Ads by Google

Related Topics

How to Detect a Wireless Intruder

Modern wireless routers can
be vulnerable to intruders, either intentionally or accidentally. Many
wireless devices automatically seek out and connect to the strongest
signal, so it is possible that a neighbor may be connected to your
router without his realizing it. Intentional intrusions can range from
relatively benign “bandwidth borrowers” to more serious attacks aimed at
theft of identity or personal information. The best defense is strong
and frequently changed passwords on your router, wireless encryption and
monitoring of connected devices.

Difficulty:
Moderate

Instructions

things you’ll need:

  • Admin password to your router (see manufacturer’s documentation)
  • Browser software (e.g. Firefox, Internet Explorer)
  1. MAC Address Method

    • 1

      Determine the Media Access
      Controller address of every authorized wireless device on your network.
      These devices include printers, laptops, desktops, hand-held devices and any other device which attaches to your network in a wireless mode.

      Each wireless card or embedded controller in these devices has a
      unique address that identifies it to the network. No two legitimate
      devices will ever have the same MAC address.

      Windows and MAC computers have this information in the control panel for your wireless network device. For other devices, check the manufacturer’s instructions for how to locate this address.

      The address will be a 12-character field, with each character being a hexadecimal character (0-9 and A-F).

    • 2

      Log on to your router as an
      administrator. Most routers can be addressed by typing 192.168.0.1 into
      any browser. Supply the correct administrator user name and password.

      Check your documentation if you have never changed these from their default values.

    • 3

      Find the menu option for
      attached wireless devices. This will vary depending on the router
      manufacturer, so check the user manuals.

    • 4

      Compare the MAC address for each
      device listed by the router as being connected with the list of MAC
      addresses for devices that you expect to be connected. Any MAC address
      for an unexpected device may be an intruder.

    • 5

      Configure your router to only
      accept connections from known MAC addresses. Most routers offer this
      feature. Check with your user documentation for instructions.

    Other Warning Signs

    • 1

      Be alert for any suspicious activity on your network. Most often you will notice this by a slowdown of your network connection speed.

    • 2

      Check your router logs for a
      record of devices connecting and disconnecting from your network. The
      procedure to access these logs is different depending on the router
      manufacturer, so check with the user documentation.

      These logs typically show connections by MAC address, so be aware of any unexpected addresses.

    • 3

      Install software on your network
      to monitor intrusions. More sophisticated intruders may have the
      capability to “spoof” MAC addresses, meaning they can set their own MAC
      address to appear to be a device which legitimately connects to your
      network.

Ads by Google

Tips & Warnings

  • Disabling the
    router from broadcasting its ID name can reduce your vulnerability to
    wireless intrusion. Also, turning off the router when you are not using
    the network makes a network more secure, if less convenient.

References

Comments

    Helpful?
    Yes
    No