>Unknown MAC address shows up in your router network
Unknown MAC address shows up in your router network
Other urls found in this thread:
Forgot to add
>Android Operating System
>You only have 1 Android phone in your home
>frogposting
>MAC
Found your problem.
>MAC addresses show up in router log
>only have PCs
>Windows 10
>Mysterious phone appears on your network device list
hahahahahahahahahahahhahaa
macfag.
You forgot to turn that easy wi-fi authentication shit off.
Stop it guys, this joke is not funny.
Are you talking about WPS Settings?
Because that is disabled.
>10367 failed ssh login attempts on your vps
Congratulations, your password is in a dictionary
>he hasn't enabled mac filtering on his router
He really didn't have to refer to the MAC address.
Not anymore, I already changed my password and now it is TWO DICTIONARY WORDS mashed together.
>implying it's android
>He thinks that this can't be easily defeated
How many devices on your network right now Sup Forumsents?
>10367 failed ssh login attempts on your vps this week
>they're all your login attempts
>posting your device mac addresses
You've fucked up.
Kek
If I turn the Wi-Fi off they can't hack me
this
prepare to be h4xd
some D-Link routers don't have that function
Is there a way to get all hostname and Mac address connected without accessing the router?
>the mouse pointer moves by itself
arp -a
>He thinks mac filtering is a security measure.
LMAO, I bet you also fell for the change SSH to a different port meme.
>IPv4
lel
>Port 22
>1000 chink IP attempts per second
>Port 2323
>0 attempts
Hmmmmmm
>new mac address shows up on router's wifi connections
>panic and block it
>new printer stops working
>they must have already penetrated my network
Heh, it was a part of my plan
All routers are manufactured in China, so expect the firmware to be backdoored and bugged to hell.
That's why you build your own senpai.
>Implying any of those 1000k chink bots were a threat.
Competent people are the ones you should be worried about.
>hidden SSID
>whitelisting macs
>wpa-psk
>wireless turned off when I'm not using it
Wow, a whole two of em.
>hidden SSID
doesn't do shit
>whitelisting macs
doesn't do shit
>wireless turned off when I'm not using it
makes it even easier to capture the handshake
>>hidden SSID
stops you being a target
>>whitelisting macs
makes it so they have to sniff and spooof mac
>>wireless turned off when I'm not using it
true but also makes it unstable to the point they'll hack someone elses
my goal isn't to make it unhackable it's to make it such an inconvenience they'll go for someone else
Doesn't work only shows my gateway
> hidden ssid behind own router
> don't even remember admin pass to ap
>171,476 words in use in English dic
>171,476*171,476
>= 29404018576 combinations of passwords possible
Make it 5 (diceware) and dictionary doesn't matter.
>Make it 5 (diceware) and dictionary doesn't matter.
Oh sure, but he said two. Five is a lot more secure than two due to the length (and thus entropy.)
For example, take two random words as I did and run them on password.kaspersky.com
I chose 'croak' and 'storing' and combined them into one password. The site says these are common words -- a single Macbook Pro would take 10 months to break it. The conficker botnet would take 23 minutes with the Tianhe supercomputer taking 9 seconds.
The moral is, five words is probably a minimum.
That's not alot desu
>E D G E
>D
>G
>E
>rename my open Wi-Fi to "$11.99/minute"
>the neighbors stop using it
le macfag is mad
nmap, you can run an ARP or ping scan.
Just remember to run nmap as root to see all the information.
MACFAGS REEEEEEEEEEEEEEEEEEEEEEE
>first day of CS classes
>prof is using something called "emacs"
>stand up
>call him a macfag
>walk out
...
le redditor is shitposting
this is nice, I got the live hosts, but how to get the hostname?`
>>>hidden SSID
>stops you being a target
Why?
Only makes you more interesting - "what is the n00b trying to protect?"
But a far bigger problem:
When not in range it causes your mobile phone to try to log into any hidden WiFi, so it's really easy to set up a generic honey trap for all the fools who use a hidden SSID.
I think the hostname you find in a routers status log(like android-, foo-iphone or bar-PC) is sent by the client when doing DHCP.
I think you would need a sniffer running while the client does that.
Not only this, but with a hidden SSID all your wireless devices broadcast the SSID instead of one single router/AP, covering a much larger area and thus making everything more vulnerable.
im trying dhcpdump
dhcp requests is visisble to other hosts in the network right?
I can see when my phone is requesting for dhcp address from my laptop?
>hostname localhost
On a wireless network you can see all the traffic, you don't need a specialized sniffer you can use Wireshark or tcpdump. Make sure your network interface is in promiscuous mode.
You can also do it completely offline, without associating with network at all wire airodump-ng/airdecap-ng(assuming you know the key).
With the aircrack suite you might be able to disconnect a client, which will automatically reconnect and you may get the DHCP information.
Nvm yep it works. but I still need to record the mac address and hostname separately
gonna need to script this
>hard reset your router
>someone is already using your connection
Oh nice... the deauth trick is pretty neat.
Quality thread.
MAC filtering is a joke.
>go on haveibeenpwned.com
> Oh no — pwned!
>Pwned on 21 breached sites and found 12 paste
>(subscribe to search sensitive breaches)
Kek
If you're not flashing stock firmware or not using a free as in freedom router, you need to leave
Thanks for the MAC-addresses. I'm in your mainframe. You're fucked, kiddo.
If you leave mobile wifi on when you leave your home network you deserve to be owned
fckin kekkk
Maybe you installed
Virtualbox or vmware
Firewall
Database
I've actually done this before, kek.
>posts all the IPs
Enjoy getting hacked, moron.
Im ddosing and sql injecting 192.168.1.1
We have the same router btw
this made me laugh so hard
i really hope it was real
also the picture sealed the post perfect
Holy fucking lol
>192.168.1.1
hey that's MY IP! are you HACKING me?
...
shit dude call the fbi
Actually yes, I have Virtualbox installed.
noice bait
>192.168.X.X
>Not using 10.0.X.X
Fuckin been there
30 or so over 5 vlans
>Software defined networking
Garbo
right, because vlans arent used literally everywhere.
I'm not worried because a mac address is only hardware.
It takes software to do damage.
>10.0.X.X
> Using a private class A for your home network
You're the kind of person who buys dog food when it's half off. Except you don't own a dog.
for i in `seq 1 254` ; do arping -c 1 123.123.123.$i | grep reply
Physical access means "I can crack this!"
>1000 chink IP attempts
>900 are for user 'root'
>root login is not even enabled
>root doesn't even have a password
>other 200 are for users that either don't exist or system users where login is explicitly disallowed.
Even if they could correctly guess my username, I have password auth disabled.
>bridged adapter
There you go
Does not show host names but does show the MAC address
This is why when you have a server you should block all foreign IPs from logging in and just block australia from even visiting. Fuck australia, I hate that stupid penal colony.
Jek