Fun way to mess with wireless freeloaders….



Some people spend a lot of time finding ways to block the freeloaders from their wireless internet. Others find fun ways to mess with them…. They start off by settup up dhcpd.conf to carve out two subnets a “good” one with known mac addresses and an untrusted…. then the fun begins with some proxy side image manipulation. Either upside down images, blurry images, etc. I wonder why you don’t just take it a step further…. block images entirely and replace with a jpg of your choice. IF you have a very BUSY accesspoint with freeloaders – maybe you could even sell an ad…. or do a captive portal for the untrusted crowd that redirects through a page that says…. “Uploading personal data…. Please wait…. Credit Card info transfered…. browsing history transfered….. email history transfered…. My Documents in progress…” Of course, it would be actually doing this…


The sad thing is that I don’t know how many people would really pay attention and be concerned. “Boy my home page is taking a while to load… I wish that guy would get a decent download speed on his cable….” “What’s all that about uploading personal information?” “Probably just some technical browser update or something…”

The bottom line here that this SHOULD drive home to people is that if you use an unknown/untrusted wireless access point they can do JUST ABOUT anything to the information going through unless there is END TO END encryption. (That’s true for just about any network connection actually – it’s just that wireless gives so MANY more possibilities for mischief.)

Oh, and with regards to end to end encryption – it’s worth looking at your security certificates if there’s any failure to identify the authenticity.

Related Posts

Blog Traffic Exchange Related Posts
  • Wireless Driver Vulnerabilities There are a couple notes to pass along with regards to some pretty serious vulnerabilities in various wireless network adapter drivers. First, Sans has information on some Intel Centrino updates that resolve some vulnerabilities that would affect the Windows Centrino driver and the ProSet management software. F-secure chimes in on......
  • F-secure list of sober virus urls When the news was first out that an antivirus firm (f-secure) had cracked the psuedo-random algorithm that the sober worm uses to determine where to download "updates" from, they said that they had previously notified German authorities where the free hosting sites were located so that they could deal with......
  • Good wireless security post I found this one at The sunbelt blog, very good article referencing a talk on wireless network security by Xavier Ashe. He highlights these trends: * Wireless threats are increasing exponentially * Tools are becoming increasingly available and easier to use…. For both good and bad * Wireless risks and......
Blog Traffic Exchange Related Websites
  • Should You Bring a Walking Stick on your Hike? [/caption]We all have the images of walking sticks from classic movies: one movie that comes to mind is Charlton Heston in "The Ten Commandments," in which during the iconic parting of the Red Sea, he holds his shepherd's staff high over the water and the seas part. Because of these......
  • Netgear wpn824 Rangemax Netgear wpn824 Rangemax Wireless Router Roam the office with complete security or surf from any couch in the house The Netgear wpn824 Rangemax Wireless Router has made my life allot easier. I get lots of questions from SOHO and SMB techies about how to set up a secure wireless network......
  • Collecting Antique Photography It may be difficult for you to understand why anyone would want to give away or to sell their family photographs, but just as there are people that are willing to sell their family photography, there are also people out there who are interested in buying up these old antique......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site