Fun way to mess with wireless freeloaders….



Some people spend a lot of time finding ways to block the freeloaders from their wireless internet. Others find fun ways to mess with them…. They start off by settup up dhcpd.conf to carve out two subnets a “good” one with known mac addresses and an untrusted…. then the fun begins with some proxy side image manipulation. Either upside down images, blurry images, etc. I wonder why you don’t just take it a step further…. block images entirely and replace with a jpg of your choice. IF you have a very BUSY accesspoint with freeloaders – maybe you could even sell an ad…. or do a captive portal for the untrusted crowd that redirects through a page that says…. “Uploading personal data…. Please wait…. Credit Card info transfered…. browsing history transfered….. email history transfered…. My Documents in progress…” Of course, it would be actually doing this…


The sad thing is that I don’t know how many people would really pay attention and be concerned. “Boy my home page is taking a while to load… I wish that guy would get a decent download speed on his cable….” “What’s all that about uploading personal information?” “Probably just some technical browser update or something…”

The bottom line here that this SHOULD drive home to people is that if you use an unknown/untrusted wireless access point they can do JUST ABOUT anything to the information going through unless there is END TO END encryption. (That’s true for just about any network connection actually – it’s just that wireless gives so MANY more possibilities for mischief.)

Oh, and with regards to end to end encryption – it’s worth looking at your security certificates if there’s any failure to identify the authenticity.

Related Posts

Blog Traffic Exchange Related Posts
  • Wireless Driver Vulnerabilities There are a couple notes to pass along with regards to some pretty serious vulnerabilities in various wireless network adapter drivers. First, Sans has information on some Intel Centrino updates that resolve some vulnerabilities that would affect the Windows Centrino driver and the ProSet management software. F-secure chimes in on......
  • Good wireless security post I found this one at The sunbelt blog, very good article referencing a talk on wireless network security by Xavier Ashe. He highlights these trends: * Wireless threats are increasing exponentially * Tools are becoming increasingly available and easier to use…. For both good and bad * Wireless risks and......
  • Identity theft So, you don't click on "phishy" links, keep your pc free from spyware, only bank at secure websites, do all the good things a cautious computer user is supposed to do to keep from having your identity stolen. Your safe right? Not entirely. I just found this in the Security......
Blog Traffic Exchange Related Websites
  • Should You Bring a Walking Stick on your Hike? [/caption]We all have the images of walking sticks from classic movies: one movie that comes to mind is Charlton Heston in "The Ten Commandments," in which during the iconic parting of the Red Sea, he holds his shepherd's staff high over the water and the seas part. Because of these......
  • Work At Home And Gather Money You Need With work at home you can gather more money and you can make more friends you expect! There are many people who still do not believe it is a good way to make money. I think they stand one of these ways – they have not tried out this kind......
  • The 3 Reasons why Mint Collectible Coins Are Valuable The Sheldon grading scale is by and large the most used grading scale for dealing with collecting coins. The top of the grading scale is reserved for those coins which can hold the status of being in mint state. These coins are the most valuable of all of the coins......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site