Avast WEBforum

Other => General Topics => Topic started by: FreewheelinFrank on December 07, 2007, 12:07:11 PM

Title: Wi-Fi piggybacking widespread, research reveals
Post by: FreewheelinFrank on December 07, 2007, 12:07:11 PM
Quote
IT security and control firm Sophos has revealed new research into the use of other people's Wi-Fi networks to piggyback onto the internet without payment. The research, carried out by Sophos on behalf of The Times, shows that 54 percent of computer users have admitted breaking the law, by using someone else's wireless internet access without permission.

According to Sophos, many internet-enabled homes fail to properly secure their wireless connection with passwords and encryption, allowing freeloading passers-by and neighbours to steal internet access rather than paying an Internet Service Provider (ISP) for their own. In addition, while businesses often have security measures in place to protect the Wi-Fi networks within their offices from attack, Sophos experts note that remote users working from home could prove to be a weak link in corporate defenses.

"Stealing Wi-Fi internet access may feel like a victimless crime, but it deprives ISPs of revenue. Furthermore, if you've hopped onto your next door neighbors' wireless broadband connection to illegally download movies and music from the net, chances are that you are also slowing down their internet access and impacting on their download limit," explained Graham Cluley, senior technology consultant for Sophos. "For this reason, most ISPs put a clause in their contracts ordering users not to share access with neighbours - but it's very hard for them to enforce this."

http://www.sophos.com/pressoffice/news/articles/2007/11/wi-fi.html (http://www.sophos.com/pressoffice/news/articles/2007/11/wi-fi.html)

Some of the advice for securing a network is contested in other places: two are apparently among "the six dumbest ways to secure a wireless LAN" (http://blogs.zdnet.com/Ou/index.php?p=43) and "Wireless security myths" (http://www.edbott.com/weblog/?p=1795).

High gain antennas like the one below can be used to piggyback a Wi-Fi connection: a little bird tells me it's possible to point one in any direction in an urban area and find an unsecured network.  ::)





Title: Re: Wi-Fi piggybacking widespread, research reveals
Post by: Lisandro on December 07, 2007, 12:48:15 PM
It's so difficult to be protected and it's so technical reading... I give up... I don't have supersecret files to be protected...
Title: Re: Wi-Fi piggybacking widespread, research reveals
Post by: FreewheelinFrank on December 07, 2007, 02:15:41 PM
Secure your network:

1) Access you router configuration page. This is usually done by entering an address in your browser. For Belkin routers, it's 192.168.2.1.

2) Click the security tab.

3) Select WPA2*.

4) Select 'Pre-shared key' and enter a key. For Belkin routers, it's a 10 character string of characters and numbers. Make it as random as possible, for example: 4Fj6vQ3aLc.

(AES seems to be the prefered encryption method, but TKIP also works.)

5) Save your settings and you're done.

Don't forget to change the router password to something secure.

(*WPA2 may require XP SP2 and a newish router. There is an alternative in WEP security which is less secure but better than nothing.)
Title: Re: Wi-Fi piggybacking widespread, research reveals
Post by: DavidR on December 07, 2007, 03:25:50 PM
I don't doubt that in an urban environment there would be enough unsecured networks not to require having your own broadband connection.

Your average punter hasn't got a clue about securing his/her network, mainly because they don't know it is necessary, ignorance is bliss.

So until hardware (wireless modem/router) manufacturers incorporate this in the set-up process it will continue to be a problem with the weak default settings. Again your average user is ignorant of how to get into the router configuration page, so if it isn't in the initial set-up they may never find it later.
Title: Re: Wi-Fi piggybacking widespread, research reveals
Post by: Lisandro on December 07, 2007, 06:31:19 PM
Thanks Frank, the keyword is WPA2 instead of WEP when possible... I'll ask to the IT support at my work to take a look on it.
Title: Re: Wi-Fi piggybacking widespread, research reveals
Post by: micky77 on December 08, 2007, 12:17:09 AM
Hello, I've just installed/set up a wireless router/modem (all in one) for a neighbour.She can now, wireless, access the internet.However,I think it now needs securing.Am I right in thinking,I access the routers settings by entering 192.168.?? and set up a wep or wpa key.Most importantly,do i then access the wireless usb adaptor software, and enter the same key/number.Thanks for any advice
Title: Re: Wi-Fi piggybacking widespread, research reveals
Post by: FreewheelinFrank on December 08, 2007, 12:34:21 AM
That's correct.

The actual address may vary according to your router. Consult the user guide or Google the router manufacturer and model.

Some common ones are listed here:

http://www.microsoft.com/athome/moredone/wirelesssetup.mspx#step3 (http://www.microsoft.com/athome/moredone/wirelesssetup.mspx#step3)

Enter the same key on the wireless computer.
Title: Re: Wi-Fi piggybacking widespread, research reveals
Post by: micky77 on December 08, 2007, 01:22:17 AM
Thanks FreewheelinFrank,will try that tomorrow.Off to me bed now. :)
Title: Re: Wi-Fi piggybacking widespread, research reveals
Post by: bob3160 on December 08, 2007, 02:48:30 AM
You could also try Network Magic (http://www.networkmagic.com/)  :)
Title: Re: Wi-Fi piggybacking widespread, research reveals
Post by: .: Mac :. on December 08, 2007, 07:05:18 AM
Quote
(*WPA2 may require XP SP2 and a newish router. There is an alternative in WEP security which is less secure but better than nothing.)

WPA 2 Requires Mac OS X Panther 10.3.3 or better (Tiger and Leopard obviously also work)
Also if you are using the Apple Airport Base station you will need Firmware 4.2 or better

Title: Re: Wi-Fi piggybacking widespread, research reveals
Post by: FreewheelinFrank on December 08, 2007, 09:19:10 AM
Quote
(*WPA2 may require XP SP2 and a newish router. There is an alternative in WEP security which is less secure but better than nothing.)

WPA 2 Requires Mac OS X Panther 10.3.3 or better (Tiger and Leopard obviously also work)
Also if you are using the Apple Airport Base station you will need Firmware 4.2 or better



From my own experience, it also works on Ubuntu 7.10. Both an internal wireless card and an external USB adapter were recognised without a problem and WPA2 worked fine.
Title: Re: Wi-Fi piggybacking widespread, research reveals
Post by: micky77 on December 08, 2007, 04:25:35 PM
You could also try Network Magic (http://www.networkmagic.com/)  :)
Thanks for the link bob,unfortunately,I don't think that programme covers the Huawei Echolife 520 router/modem.Anyway,I have accessed the routers settings,chose wpa2,.entered new password,and pressed submit.( it wouldn't work wirelsessly,so I had to run a telephone extension lead). I then opened the netgear WG111v2 usb wireless adaptor,chose wpa2,entered same password,and all seems well.I have also changed the  routers default  password.All seems to have gone far better than expected,however,is there anyway to check the wireless connection is secure ? I expected a padlock symbol or something. Cheers :D
Title: Re: Wi-Fi piggybacking widespread, research reveals
Post by: FreewheelinFrank on December 08, 2007, 06:40:13 PM
There may well be some sort of indication that the connection is encrypted: on my laptop there is a padlock symbol in the Intel wireless utility in Windows, but that's obviously a feature of the Intel software, and the Netgear software will differ. However, I'm pretty sure there should be something: it may say encrypted or password protected.
Title: Re: Wi-Fi piggybacking widespread, research reveals
Post by: timcan on December 08, 2007, 08:19:54 PM
Hi, to add to FWF's reply you can open your network connections in the control panel and see if it's encrypted or not.Hope this helps,tim
Title: Re: Wi-Fi piggybacking widespread, research reveals
Post by: micky77 on December 08, 2007, 11:06:25 PM
Thank you very much FWF, and Timcan,I really appreciate your input :D
Title: Re: Wi-Fi piggybacking widespread, research reveals
Post by: FreewheelinFrank on December 11, 2007, 07:05:02 PM
Quote
An Australian man arrested in an undercover sting has been charged for allegedly tapping into home wireless networks so he could anonymously send threatening emails.

Police say the 22 year-old from Rockhampton, Queensland had sent threatening emails to various individuals since August. To avoid detection, he connected to unencrypted Wi-Fi connections so the IP addresses couldn't be traced back to him. The practice is sometimes called piggybacking. He also spoofed the email address of Tony Sarno, editor of the APC Computer magazine.

At one point, investigators knocked on the door they believed belonged to the perpetrator, but later concluded the elderly couple living there had their wireless connection accessed by someone else.

The break in the case came last week after the suspect sent a letter demanding money be delivered to a park. Police arrested him there without incident. He has been charged with demanding property by threat and using a carriage service to threaten serious harm.

http://www.theregister.co.uk/2007/12/11/piggybacking_arrest_made/ (http://www.theregister.co.uk/2007/12/11/piggybacking_arrest_made/)

Interesting comments, too.

http://www.theregister.co.uk/2007/12/11/piggybacking_arrest_made/comments/#c_113591 (http://www.theregister.co.uk/2007/12/11/piggybacking_arrest_made/comments/#c_113591)