Fun way to mess with wireless freeloaders….



Some people spend a lot of time finding ways to block the freeloaders from their wireless internet. Others find fun ways to mess with them…. They start off by settup up dhcpd.conf to carve out two subnets a “good” one with known mac addresses and an untrusted…. then the fun begins with some proxy side image manipulation. Either upside down images, blurry images, etc. I wonder why you don’t just take it a step further…. block images entirely and replace with a jpg of your choice. IF you have a very BUSY accesspoint with freeloaders – maybe you could even sell an ad…. or do a captive portal for the untrusted crowd that redirects through a page that says…. “Uploading personal data…. Please wait…. Credit Card info transfered…. browsing history transfered….. email history transfered…. My Documents in progress…” Of course, it would be actually doing this…


The sad thing is that I don’t know how many people would really pay attention and be concerned. “Boy my home page is taking a while to load… I wish that guy would get a decent download speed on his cable….” “What’s all that about uploading personal information?” “Probably just some technical browser update or something…”

The bottom line here that this SHOULD drive home to people is that if you use an unknown/untrusted wireless access point they can do JUST ABOUT anything to the information going through unless there is END TO END encryption. (That’s true for just about any network connection actually – it’s just that wireless gives so MANY more possibilities for mischief.)

Oh, and with regards to end to end encryption – it’s worth looking at your security certificates if there’s any failure to identify the authenticity.

Related Posts

Blog Traffic Exchange Related Posts
  • Wireless Driver Vulnerabilities There are a couple notes to pass along with regards to some pretty serious vulnerabilities in various wireless network adapter drivers. First, Sans has information on some Intel Centrino updates that resolve some vulnerabilities that would affect the Windows Centrino driver and the ProSet management software. F-secure chimes in on......
  • More information on Titan Rain ("Hack attacks") Earlier this year there was an article or two about a rumored "hack attack" that was ongoing against US Government (and contractor) computer systems. The stories claimed that the attacks seemed to be coming from China. Today I'm seeing a couple of articles on the topic. First up is an......
  • Network Security guide for the home or small business network - Part 19 - What about when you're not on your home network? When you're not at your home network is probably one of those times you should be more on your guard. Wireless access points are very common and a greatly useful thing, but there are some steps you should take to protect yourself, your pc and the data stored there. First......
Blog Traffic Exchange Related Websites
  • Work At Home And Gather Money You Need With work at home you can gather more money and you can make more friends you expect! There are many people who still do not believe it is a good way to make money. I think they stand one of these ways – they have not tried out this kind......
  • The Opposite of Successful Blogging There is an opposite to successful blogging, which is blogging that drives your readers in the wrong direction. Take a look at this list of things that you can do to drive readers away so that you will have a better understanding of what you need to do in order......
  • WEP vs WPA Another question I get asked a lot is on Wireless security.  People get very confused by the security options out there, and the industry doesn't help by adding acronym after acronym.  So what do you do?  The answer is fairly simple - secure your network with WPA!! There are lots......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site