Unknown MAC address shows up in your router network

>Unknown MAC address shows up in your router network

Other urls found in this thread:

password.kaspersky.com/
twitter.com/SFWRedditGifs

Forgot to add

>Android Operating System
>You only have 1 Android phone in your home

>frogposting

>MAC
Found your problem.

>MAC addresses show up in router log
>only have PCs

>Windows 10
>Mysterious phone appears on your network device list

hahahahahahahahahahahhahaa
macfag.

You forgot to turn that easy wi-fi authentication shit off.

Stop it guys, this joke is not funny.

Are you talking about WPS Settings?

Because that is disabled.

>10367 failed ssh login attempts on your vps

Congratulations, your password is in a dictionary

>he hasn't enabled mac filtering on his router

He really didn't have to refer to the MAC address.

Not anymore, I already changed my password and now it is TWO DICTIONARY WORDS mashed together.

>implying it's android

>He thinks that this can't be easily defeated

How many devices on your network right now Sup Forumsents?

>10367 failed ssh login attempts on your vps this week
>they're all your login attempts

>posting your device mac addresses
You've fucked up.

Kek

If I turn the Wi-Fi off they can't hack me

this
prepare to be h4xd

some D-Link routers don't have that function

Is there a way to get all hostname and Mac address connected without accessing the router?

>the mouse pointer moves by itself

arp -a

>He thinks mac filtering is a security measure.

LMAO, I bet you also fell for the change SSH to a different port meme.

>IPv4

lel

>Port 22
>1000 chink IP attempts per second

>Port 2323
>0 attempts

Hmmmmmm

>new mac address shows up on router's wifi connections
>panic and block it
>new printer stops working
>they must have already penetrated my network

Heh, it was a part of my plan

All routers are manufactured in China, so expect the firmware to be backdoored and bugged to hell.

That's why you build your own senpai.

>Implying any of those 1000k chink bots were a threat.

Competent people are the ones you should be worried about.

>hidden SSID
>whitelisting macs
>wpa-psk
>wireless turned off when I'm not using it

Wow, a whole two of em.

>hidden SSID
doesn't do shit
>whitelisting macs
doesn't do shit
>wireless turned off when I'm not using it
makes it even easier to capture the handshake

>>hidden SSID
stops you being a target
>>whitelisting macs
makes it so they have to sniff and spooof mac
>>wireless turned off when I'm not using it
true but also makes it unstable to the point they'll hack someone elses

my goal isn't to make it unhackable it's to make it such an inconvenience they'll go for someone else

Doesn't work only shows my gateway

> hidden ssid behind own router
> don't even remember admin pass to ap

>171,476 words in use in English dic
>171,476*171,476
>= 29404018576 combinations of passwords possible
Make it 5 (diceware) and dictionary doesn't matter.

>Make it 5 (diceware) and dictionary doesn't matter.

Oh sure, but he said two. Five is a lot more secure than two due to the length (and thus entropy.)

For example, take two random words as I did and run them on password.kaspersky.com/

I chose 'croak' and 'storing' and combined them into one password. The site says these are common words -- a single Macbook Pro would take 10 months to break it. The conficker botnet would take 23 minutes with the Tianhe supercomputer taking 9 seconds.

The moral is, five words is probably a minimum.

That's not alot desu

>E D G E
>D
>G
>E

>rename my open Wi-Fi to "$11.99/minute"
>the neighbors stop using it

le macfag is mad

nmap, you can run an ARP or ping scan.

Just remember to run nmap as root to see all the information.

MACFAGS REEEEEEEEEEEEEEEEEEEEEEE

>first day of CS classes
>prof is using something called "emacs"
>stand up
>call him a macfag
>walk out

...

le redditor is shitposting

this is nice, I got the live hosts, but how to get the hostname?`

>>>hidden SSID
>stops you being a target

Why?
Only makes you more interesting - "what is the n00b trying to protect?"

But a far bigger problem:
When not in range it causes your mobile phone to try to log into any hidden WiFi, so it's really easy to set up a generic honey trap for all the fools who use a hidden SSID.

I think the hostname you find in a routers status log(like android-, foo-iphone or bar-PC) is sent by the client when doing DHCP.

I think you would need a sniffer running while the client does that.

Not only this, but with a hidden SSID all your wireless devices broadcast the SSID instead of one single router/AP, covering a much larger area and thus making everything more vulnerable.

im trying dhcpdump
dhcp requests is visisble to other hosts in the network right?

I can see when my phone is requesting for dhcp address from my laptop?

>hostname localhost

On a wireless network you can see all the traffic, you don't need a specialized sniffer you can use Wireshark or tcpdump. Make sure your network interface is in promiscuous mode.

You can also do it completely offline, without associating with network at all wire airodump-ng/airdecap-ng(assuming you know the key).

With the aircrack suite you might be able to disconnect a client, which will automatically reconnect and you may get the DHCP information.

Nvm yep it works. but I still need to record the mac address and hostname separately

gonna need to script this

>hard reset your router
>someone is already using your connection

Oh nice... the deauth trick is pretty neat.

Quality thread.

MAC filtering is a joke.

>go on haveibeenpwned.com
> Oh no — pwned!
>Pwned on 21 breached sites and found 12 paste
>(subscribe to search sensitive breaches)

Kek

If you're not flashing stock firmware or not using a free as in freedom router, you need to leave

Thanks for the MAC-addresses. I'm in your mainframe. You're fucked, kiddo.

If you leave mobile wifi on when you leave your home network you deserve to be owned

fckin kekkk

Maybe you installed
Virtualbox or vmware
Firewall
Database

I've actually done this before, kek.

>posts all the IPs
Enjoy getting hacked, moron.

Im ddosing and sql injecting 192.168.1.1

We have the same router btw

this made me laugh so hard

i really hope it was real

also the picture sealed the post perfect

Holy fucking lol

>192.168.1.1
hey that's MY IP! are you HACKING me?

...

shit dude call the fbi

Actually yes, I have Virtualbox installed.

noice bait

>192.168.X.X
>Not using 10.0.X.X

Fuckin been there

30 or so over 5 vlans

>Software defined networking

Garbo

right, because vlans arent used literally everywhere.

I'm not worried because a mac address is only hardware.

It takes software to do damage.

>10.0.X.X

> Using a private class A for your home network

You're the kind of person who buys dog food when it's half off. Except you don't own a dog.

for i in `seq 1 254` ; do arping -c 1 123.123.123.$i | grep reply

Physical access means "I can crack this!"

>1000 chink IP attempts
>900 are for user 'root'
>root login is not even enabled
>root doesn't even have a password
>other 200 are for users that either don't exist or system users where login is explicitly disallowed.

Even if they could correctly guess my username, I have password auth disabled.

>bridged adapter
There you go

Does not show host names but does show the MAC address

This is why when you have a server you should block all foreign IPs from logging in and just block australia from even visiting. Fuck australia, I hate that stupid penal colony.

Jek