View Full Version : WI FI question
*MAD DOG*
01-23-2013, 02:20 AM
I need help. I can't decide in a decent name for my WI FI. Help me by voting on my poll or by posting suggestions.
Astroman
01-23-2013, 05:14 AM
I voted for free wifi, then password protect the shit out of it, haha.
My personal favorite is naming it "disabled", nobody will even try to get on. :biggrin:
Another one could be "56k connection" or something similar.
david_827
01-23-2013, 10:19 AM
i actually named mine FBI Surveillance Van.....
ilikerice
01-23-2013, 12:35 PM
^thats awesome^
mine is Dogmeat, fiance is a Fallout3 fanatic
fnkngrv
01-23-2013, 12:43 PM
I have mine set as "Click Me" on the 5.0 and "Morgue" for the 2.4. I also make sure that I reduce the broadcast to as small a signal strength as possible to minimize folks from trying to hop on it. The password is actually a phrase with spaces which really limits the ability to be cracked without brute force for literally months. Lastly, I have some tweaks so that if someone were to crack into my network they aren't getting anywhere, but my redirect server :)
On another note I actually despise 802.11 connectivity. I have been working fervently to have my whole house wired for gigabit Ethernet along with my desktop/server machines connecting ten gigabit. There are of course limiting factors for folks hence the justification for 802.11, but I try to stay away from it.
fnkngrv
01-23-2013, 12:45 PM
I voted for free wifi, then password protect the shit out of it, haha.
My personal favorite is naming it "disabled", nobody will even try to get on. :biggrin:
Another one could be "56k connection" or something similar.
I have a buddy of mine that is named "HP OfficeJet 9872" so that anyone seeing it would think that it isn't a network with internet access...haha. The greatest thing about it is that there isn't even a model by that number. :bellyroll: Geeks like us have some of the best humour!
fnkngrv
01-23-2013, 12:46 PM
Oh yeah, if you aren't going to broadcast the SSID then some of the naming becomes a moot point and not as fun.
ciscobear
01-23-2013, 08:06 PM
my nephew's own is named "Virus" LOLLLLLLLLLLLLL I love the new Linksys router names, OrangePanda, GreenDog, PeachGiraffe LOL
suckerface
01-24-2013, 04:42 PM
The password is actually a phrase with spaces which really limits the ability to be cracked without brute force for literally months. Lastly, I have some tweaks so that if someone were to crack into my network they aren't getting anywhere, but my redirect server :)
While I certainly condone the use of good passwords, or passphrases ideally, with cluster/distributed computing becoming easier and easier to not only build, but rent (Amazon EC2, for example), cracking complex passwords that are strongly encrypted a trivial task. You've got your bases covered with your redirect server (props on that!), but some material to read for those who aren't familiar:
Older: http://www.infosecisland.com/blogview/11018-Cracking-WPA-Protected-WiFi-in-Six-Minutes.html
Windows hashes, but same idea: http://www.techspot.com/news/51044-25-gpu-cluster-can-brute-force-windows-password-in-record-time.html
Online pay service: http://gpuhash.com/
Also, heaven forbid anyone uses WEP, as that can be cracked in minutes, and WPS has a gaping flaw that is just as easy to exploit.
*MAD DOG*
01-25-2013, 03:24 AM
And the winner is........
http://i208.photobucket.com/albums/bb65/MADDOGZONER/3C266F85-94CA-4A87-B6C6-99456A60B927-3465-00000203C98A2119.jpg
I went with "Skynet". Mainly because of the Terminator 2 link and that "Pretty Fly For A WI FI" would not show up on my iPhone 5 screen, it was shortened to Pretty Fly Fo..... Which I thought looked crap.
Thanks for the input people's.
*MAD DOG*
01-25-2013, 03:29 AM
Also, what are your thoughts on WPA2-PSK as the Wireless Security Mode? Is it good? I have unlimited internet so scabs aren't a problem. If they can hack it they can use it I suppose.
Astroman
01-25-2013, 04:32 AM
I think that's the best encryption to use vs the others. I can crack it though in a few hours using BackTrack and Reaver. Wouldn't worry about it much though unless you live in an apartment building that has some pretty computer savvy tenants as it does take some advanced computer knowledge to pull off and most won't bother anyway. Your best best bet is making the password as long as possible, the longer it is, the longer it takes a cracking program to figure it out (a sentence or phrase would be perfect and easy for you to remember).
I like the idea of naming the SSID the non-existent printer, good one!
Mine is "geeky", goes well with the GeekWerks Yaris :biggrin:
suckerface
01-25-2013, 02:23 PM
Also, what are your thoughts on WPA2-PSK as the Wireless Security Mode? Is it good? I have unlimited internet so scabs aren't a problem. If they can hack it they can use it I suppose.
PSK will work great, it's what I use. Combine it with a long, difficult password, and you'll be good to go. Generate one at http://www.yellowpipe.com/yis/tools/WPA_key/generator.php and use the 63 character one. I keep it in a text file on a flash drive to copy/paste onto laptops/desktops, then use http://www.qrstuff.com/ to create a QR Code for scanning with a barcode scanner for mobile phones and tablets.
For example:
Key: O&D9mc5lzQ-j\b/0L+\8Wf-#wIatkHi,Dw7zNAaBaYvS-ucKqWSC2Q3yjdgIuEG
QR Code:
http://api.qrserver.com/v1/create-qr-code/?data=O%26D9mc5lzQ-j%5Cb%2F0L%2B%5C8Wf-%23wIatkHi%2CDw7zNAaBaYvS-ucKqWSC2Q3yjdgIuEG&size=250x250
qrstuff.com also has the ability to create a QR Code to automatically log an Android in, just need the SSID, key, and security type to create the QR Code. Scan it with a barcode scanning app, and it'll automatically connect and log you in.
Personally, while I love funny SSIDs, I don't broadcast mine. Can't easily connect to a network you can't see :cool:
fnkngrv
01-25-2013, 03:49 PM
While I certainly condone the use of good passwords, or passphrases ideally, with cluster/distributed computing becoming easier and easier to not only build, but rent (Amazon EC2, for example), cracking complex passwords that are strongly encrypted a trivial task. You've got your bases covered with your redirect server (props on that!), but some material to read for those who aren't familiar:
Older: http://www.infosecisland.com/blogview/11018-Cracking-WPA-Protected-WiFi-in-Six-Minutes.html
Windows hashes, but same idea: http://www.techspot.com/news/51044-25-gpu-cluster-can-brute-force-windows-password-in-record-time.html
Online pay service: http://gpuhash.com/
Also, heaven forbid anyone uses WEP, as that can be cracked in minutes, and WPS has a gaping flaw that is just as easy to exploit.
All great information for sure. I am a CISSP and with the history that I have with certain employers and clients I have had to do extensive security work. Since we are talking about WI-FI however and as previously stated I have my broadcast set to roughly 8-15 feet outside of my house depending on which part of the house you are at along with my security camera feed warnings I will know if someone is trying to penetrate and steal bandwidth :biggrin: . I also actually have my WPA2-PSK set to rotate the 4 network keys I use. My family hates it because it is such a pain when they try to add a new device especially since DHCP is also turned off and they have no clue how networks work.
As for the redirect I actually have that set so that if someone opens an internet browser page it goes to one that I built with an animated .gif og My Little Pony running through a field of colorful flowers and butterflies. :bellyroll:
If you are talking about not just WI-FI, but actual IP based network attacks then sure folks can hack and will eventually break it, but the most disturbing part about it is that ISPs in the U.S.A. are now providing modem/router equipment that they control via a little known back door elevated account which does let them in even though they try to tell you otherwise. :evil: This I know is fact and you can do a search for it to find out how disturbing it really is. In this day and age you cannot live by the adage of "If you aren't doing anything wrong then you have nothing to worry about". This is the Cyber War Age and folks need to take heed.
I can give you a great example. TWC is my ISP. They do not do anything more than basic background checks on technicians AFAIK and been able to tell. IF they are savy and have any number of stupid reasons to penetrate someone's network they can and depending could even fall through the cracks in being audited by their own chain of command. A previous coworker who is a certified Ethical Hacker has tools set up on his network and only 3 weeks after upgrading to one of the new DOCSIS 3 Ubee Routers his network was probed and attemped to be hacked passed the router. He presented his logs to TWC and the technician was only reprimanded as he played it off as a "mistake".
fnkngrv
01-25-2013, 04:49 PM
This is a perfect example of why this all so important on a silly level:
http://gizmodo.com/5979004/print-to-86000-random-printers-around-the-world-thanks-to-google
suckerface
01-25-2013, 06:21 PM
All great information for sure. I am a CISSP and with the history that I have with certain employers and clients I have had to do extensive security work. Since we are talking about WI-FI however and as previously stated I have my broadcast set to roughly 8-15 feet outside of my house depending on which part of the house you are at along with my security camera feed warnings I will know if someone is trying to penetrate and steal bandwidth :biggrin: . I also actually have my WPA2-PSK set to rotate the 4 network keys I use. My family hates it because it is such a pain when they try to add a new device especially since DHCP is also turned off and they have no clue how networks work.
As for the redirect I actually have that set so that if someone opens an internet browser page it goes to one that I built with an animated .gif og My Little Pony running through a field of colorful flowers and butterflies. :bellyroll:
If you are talking about not just WI-FI, but actual IP based network attacks then sure folks can hack and will eventually break it, but the most disturbing part about it is that ISPs in the U.S.A. are now providing modem/router equipment that they control via a little known back door elevated account which does let them in even though they try to tell you otherwise. :evil: This I know is fact and you can do a search for it to find out how disturbing it really is. In this day and age you cannot live by the adage of "If you aren't doing anything wrong then you have nothing to worry about". This is the Cyber War Age and folks need to take heed.
I can give you a great example. TWC is my ISP. They do not do anything more than basic background checks on technicians AFAIK and been able to tell. IF they are savy and have any number of stupid reasons to penetrate someone's network they can and depending could even fall through the cracks in being audited by their own chain of command. A previous coworker who is a certified Ethical Hacker has tools set up on his network and only 3 weeks after upgrading to one of the new DOCSIS 3 Ubee Routers his network was probed and attemped to be hacked passed the router. He presented his logs to TWC and the technician was only reprimanded as he played it off as a "mistake".
Very well done, but to pose a situation: What about high gain antennas? Kind of defeats a close range broadcast ;) Granted, you have your bases covered otherwise, and I LOVE hearing about other people actually knowing WTF they're doing (no offense to anyone else :0P)
Your point of TWC (who is my ISP as well) is the #1 reason I supervise every install, buy my own modem/router, and do not let them touch my PC (there's no reason for them to, especially to install any software).
The last time they did it, I started doing some configuration of the network, checking IPs, and doing a speedtest. The technician stood there with his jaw open, completely amazed at what (a simple task) I was doing.
FWIW, though I'm not CISSP (vendor neutrality for me) my degrees are in Network Design and Network Security, so you can understand my appreciation of your work and input.
fnkngrv
01-25-2013, 07:21 PM
would not show up on my iPhone 5 screen, it was shortened to Pretty Fly Fo..... Which I thought looked crap.
:laughabove::laughabove:
fnkngrv
01-25-2013, 07:24 PM
Very well done, but to pose a situation: What about high gain antennas? Kind of defeats a close range broadcast ;)
You use the term "high gain antennas" where I live and someone would ask why you have DishNetwork or DirecTV in your car anyway?
:biggrin:
Unless there are some spooks or otherwise deciding to "rough it" or be on a hunting trip for Moose in Northern Maine I think I will be ok...haha
david_827
01-26-2013, 10:32 AM
As for the redirect I actually have that set so that if someone opens an internet browser page it goes to one that I built with an animated .gif og My Little Pony running through a field of colorful flowers and butterflies. :bellyroll:
i would love to see the look on someones face when they end up on that page
:laughabove:
vBulletin® v3.8.11, Copyright ©2000-2025, vBulletin Solutions Inc.