Another Reason To Secure Your Wireless Network

HardOCP News

[H] News
Joined
Dec 31, 1969
Messages
0
Someone logging on to an unsecured wireless network usually doesn't make the news. Well, unless the person is an ex-cop....surfing for child porn...on the church's wi-fi connection. :eek:

Investigators say a former Kingsport police officer accessed child pornography over wireless networks belonging to neighbors, businesses and a church. Special agents said Chandler was able to access the Internet from more than 30 locations, including one belonging to the Higher Ground Baptist Church.
 
Seriously?

Seems like every other day there is a piece of news where some authority figure is caught surfing child porn on WiFi..

Is child porn really that attractive? It seems like the new weed.
 
Seriously?

Seems like every other day there is a piece of news where some authority figure is caught surfing child porn on WiFi..

Is child porn really that attractive? It seems like the new weed.


hmm - Childy Weed Porn ?
 
Over the churches Wi-Fi :eek: I would say he'll get extra punishment for that but what he's done already I think he's deserving full bore hellfire anyways.
 
Over the churches Wi-Fi :eek: I would say he'll get extra punishment for that but what he's done already I think he's deserving full bore hellfire anyways.

Don't forget the prison buttsex. He deserves some of that, too. :D
 
Hate this guy.. steals unsecured bandwidth AND unsecured burgers!

hamburglar.jpg
 
Over the churches Wi-Fi :eek: I would say he'll get extra punishment for that but what he's done already I think he's deserving full bore hellfire anyways.

He'll get extra jail time because he used a church's connection? You're a moron.
 
"Almost every router is installed with Wi-Fi now," Calce said. "Wi-Fi is so incredibly easy to crack or manipulate and people fail to realize this. Even if you are on password-protected Wi-Fi, it's so buggy to the point where it's very easy to crack wireless passwords."

source: http://www.cnn.com/2011/TECH/web/08/15/mafiaboy.hacker
According to http://mobile.slashdot.org/story/11/08/15/1554241/WPAWPA2-Cracking-With-CPUs-GPUs-and-the-Cloud, as long as you use WPA2+AES with a password 6 or more characters long and no dictionary words, you're good to go.

Otherwise it's true.
 
"Almost every router is installed with Wi-Fi now," Calce said. "Wi-Fi is so incredibly easy to crack or manipulate and people fail to realize this. Even if you are on password-protected Wi-Fi, it's so buggy to the point where it's very easy to crack wireless passwords."

source: http://www.cnn.com/2011/TECH/web/08/15/mafiaboy.hacker
I don't believe that. WEP is easy to get past, but not WPA or WPA2 with AES and a proper PSK.

Not just my opinion either: http://www.tomshardware.com/reviews/wireless-security-hack,2981-10.html

Rest easy. From a practical standpoint, WPA is fairly safe. There are far too many salted key-derived hashes to process. The Wi-Fi Alliance got that portion of the protocol right. Even with a pair of Radeon HD 6990s, we're limited to about 200 000 passwords per second, and that means any alphanumeric password longer than seven characters is almost impossible to crack in under a year.


And before people start suggesting dumb things, I will post this link yet again:

The six dumbest ways to secure a wireless LAN
http://www.zdnet.com/blog/ou/the-six-dumbest-ways-to-secure-a-wireless-lan/43
 
Child pervs are despicable, but I wonder about the implications of accusing people of it.

I get this dude actually did what they are saying he did, but all the cops have to do these day is say they caught a child predator and everyone falls right in line "BURN HIM"

scary stuff.
 
A little OT but:

Rest easy. From a practical standpoint, WPA is fairly safe. There are far too many salted key-derived hashes to process. The Wi-Fi Alliance got that portion of the protocol right. Even with a pair of Radeon HD 6990s, we're limited to about 200 000 passwords per second, and that means any alphanumeric password longer than seven characters is almost impossible to crack in under a year.

Someone who's seriously about it isn't going to use a pair of Radeons. They are going to put some distributed botnet on it and turn out 2,000,000 or 20,000,000 passwords per second bringing the time required to get it right down to days if not minutes.

The numbers are all made up just for the purpose of this discussion but I think a lot of "security experts" completely underestimate the resources available to folks who are up to no good.

Obviously it's all relative. My house sits on a lot where only one of my neighbors is close enough to pick up my wireless signal so I am not worried about someone wanting to break into my network and having the resources available to do so. In an urban environment that's a whole different story.
 
Dude is a cop who is busted for child porn.

He won't live more than 1 day in prison.
 
A little OT but:



Someone who's seriously about it isn't going to use a pair of Radeons. They are going to put some distributed botnet on it and turn out 2,000,000 or 20,000,000 passwords per second bringing the time required to get it right down to days if not minutes.

The numbers are all made up just for the purpose of this discussion but I think a lot of "security experts" completely underestimate the resources available to folks who are up to no good.

Obviously it's all relative. My house sits on a lot where only one of my neighbors is close enough to pick up my wireless signal so I am not worried about someone wanting to break into my network and having the resources available to do so. In an urban environment that's a whole different story.

Because every random ex-cop/hacker out there has 100,000 strong botnet they unleash on unsuspecting churches for days on end trying to steal their wireless. But just in case, up your password from 7 to 8 characters by adding a random symbol somewhere.
 
Child pervs are despicable, but I wonder about the implications of accusing people of it.

I get this dude actually did what they are saying he did, but all the cops have to do these day is say they caught a child predator and everyone falls right in line "BURN HIM"

scary stuff.

Yeah, I'm assuming he can have a jury trial and the cops have evidence from his PC. Even if you use proxies they can work back to you eventually, especially if you slip up and get lazy one day.
 
Someone who's seriously about it isn't going to use a pair of Radeons. They are going to put some distributed botnet on it and turn out 2,000,000 or 20,000,000 passwords per second bringing the time required to get it right down to days if not minutes.

Asking because I don't know. If you have an encrypted file, you could unleash your 20 million passwords per second on it, but his is in the context of cracking into a router over Wi-Fi. Can a router actually process that many attempts over Wi-Fi, or does the bandwidth of Wi-Fi, as well as the way the router handles login attempts, limit the number of passwords per second you can try?

It seems to me like it would be basic router security 101 for a router to not accept more than a few dozen login attempts per second.
 
You can read about how to do this stuff pretty easily on the internet. A wep password can be done within 2 minutes pretty easily. So once you get the handshake from a WPA router, you then throw that file against your army of computers. Once you get that handshake, which takes less than a minute, you don't need the connection anymore.

Asking because I don't know. If you have an encrypted file, you could unleash your 20 million passwords per second on it, but his is in the context of cracking into a router over Wi-Fi. Can a router actually process that many attempts over Wi-Fi, or does the bandwidth of Wi-Fi, as well as the way the router handles login attempts, limit the number of passwords per second you can try?

It seems to me like it would be basic router security 101 for a router to not accept more than a few dozen login attempts per second.
 
You can read about how to do this stuff pretty easily on the internet. A wep password can be done within 2 minutes pretty easily.

Yeah, WEP is pretty useless, I think most modern routers default to WPA these days.
 
Yeah, WEP is pretty useless, I think most modern routers default to WPA these days.
Now if only they'd default to WPA2. Oh also I believe WPA-TKIP is pretty bad as well. Not quite as bad as WEP, but still easily crackable.
 
I guess this shows that proxies such as Tor are useless. The article indicated they used proxies.
 
:mad:
Dude is a cop who is busted for child porn.

He won't live more than 1 day in prison.
He's a cop...he'll probably just get time off...PAID! That's what usually happens whenever they get caught doing something. :mad:
 
The local cop has had to move his location as the guy with the unsecured wireless router moved or secured it.

there are 4-5 unsecured wireless routers within range of my house.
(not to say that is with a directional antenna and high output wireless card)
 
I guess this shows that proxies such as Tor are useless. The article indicated they used proxies.

Yet to hear anyone caught using tor. Anyway article only mentions a proxy. How do you know it wasn't some random free web proxy?
 
Yet to hear anyone caught using tor. Anyway article only mentions a proxy. How do you know it wasn't some random free web proxy?

Well and even if you use a proxy/tor, all it takes is one day forgetting to turn it on and you're screwed. If the authorities control or MIM the server you're connecting to, there could be cookie shenanigans, trojanized files executed etc. The guy could have been social engineered to give up the city he lived in etc. Since this guy was an ex-cop maybe he was posting evidence from other local cases. Thousands of ways to get busted.
 
Well and even if you use a proxy/tor, all it takes is one day forgetting to turn it on and you're screwed. If the authorities control or MIM the server you're connecting to, there could be cookie shenanigans, trojanized files executed etc. The guy could have been social engineered to give up the city he lived in etc. Since this guy was an ex-cop maybe he was posting evidence from other local cases. Thousands of ways to get busted.

Well I agree on some points; if you are browsing the regular web using TOR, and one day you forget then you are SOL. Now, as far as MIM attack, TOR uses 3 different gateways to get to your destination, and it would require the attacker to control all 3 points to see who is sending the request.

FWIR authorities like to raid TOR exit nodes, and then that person has to prove he was not knowingly facilitating illegal activities, etc. Now, if you use TOR and download shit or accept cookies, you are stupid and deserve to get caught if you are doing something illegal.

I also think it would really hurt freedom of speech if it was that easy to break the anonymity of TOR (think countries which filter web content, not just pr0n). TOR also avoids using a node from the same subnet or IP space (I forget which), and considering nodes are changed every 15min I find it extremely difficult that the authorities would be able to pull this off.

My bet is was browsing regular web through some open proxy. I find the concept of TOR to be interesting, but at the same time it is used far too often for illegal activities (read: CP) and as such that is what people remember it for.
 
Back
Top