• Lucid Dreaming - Dream Views




    Results 1 to 19 of 19
    1. #1
      Drivel's Advocate Xaqaria's Avatar
      Join Date
      May 2007
      LD Count
      WhoIsJohnGalt?
      Gender
      Location
      Denver, CO Catchphrase: BullCockie!
      Posts
      5,589
      Likes
      930
      DJ Entries
      9

      Question about IP's (sort of)

      Okay, I'm fairly adept with computers but I know next to nothing about networking. My question is, if I am picking up internet from a wireless router in a neighbor's house; how difficult is it to trace my activity directly to my computer? Is the trail going to end at their house, or is their some way to find where I'm connecting from, and if there is; is it something that will still be findable after I disconnect from their network?

      The ability to happily respond to any adversity is the divine.
      Art
      Dream Journal Shaman Apprentice Chronicles

    2. #2
      FBI agent Ynot's Avatar
      Join Date
      Oct 2005
      Gender
      Location
      Southend, Essex
      Posts
      4,337
      Likes
      14
      the only way to geographically fix a wireless connection is via triangulation

      Someone will need to isolate the stream of packets between you and your neighbour's router, and then using 3-4 receivers in different locations, try to triangulate your position

      *edit*
      sorry,
      I think I've misunderstood what you're asking

      you mean, if you are leeching a torrent
      and someone is spying on the leechers
      can it come back to you?
      in this case, no, it'll end it the router
      Last edited by Ynot; 04-15-2008 at 05:11 PM.
      (\_ _/)
      (='.'=)
      (")_(")

    3. #3
      When the ink runs out... Kushna Mufeed's Avatar
      Join Date
      Nov 2007
      Gender
      Posts
      1,548
      Likes
      3
      Not sure for certain, but I'd guess they'd be able to trace it to the router, but they won't be able to trace it to your computer unless you're connected to the network.

      Such a strange question...

      Naughty naughty...

      Quote Originally Posted by Jeff777 View Post
      I am not sorry or empathetic whatsoever for saying that I believe the world would be much better off without people like you in it. Have a great fucking day.
      [broken link removed]The Dynamics of Segrival[/URL]
      Discuss Segrival here
      See my other [broken link removed]

    4. #4
      FBI agent Ynot's Avatar
      Join Date
      Oct 2005
      Gender
      Location
      Southend, Essex
      Posts
      4,337
      Likes
      14
      Quote Originally Posted by Kushna Mufeed View Post
      Naughty naughty...
      I often hop on my neighbours network
      just to see what I look like in torrent swarms, etc from other people's connections

      nought wrong with that
      I equate it to using the loo in someone's house
      as long as you don't leave a horrible mess after you, no problem
      (\_ _/)
      (='.'=)
      (")_(")

    5. #5
      Member
      Join Date
      Apr 2008
      Gender
      Posts
      78
      Likes
      0
      Well I won't be shy and admit I have done some of my leeching from neighbors wifi, I even brought an SRX 400 attenna for the bigger pc

      At first it was cause this place had no phone connection or cable installed to begin with, so I didn't wanna pay.

      But now I'm a law abiding citizen

      Anyway, they won't figure out it;s you, tho they might call there ISP and ask whats wrong with there cnnection, then the isp could tell em well if you're using a router someone could be spooning off it and then they'll just turn off the router/modem when not in use @.@
      "I don't have time for miracles, they make me puke."
      ~Gatts

      DARK DREAMS

    6. #6
      Banned
      Join Date
      Jul 2006
      Gender
      Location
      ʇsǝɹɔpooʍ
      Posts
      3,207
      Likes
      176
      Can you say "Network Sniffer?"

      It would be a cakewalk to figure out who it was if you happen to check email. ISP_A can call up E-mail Provider_B and usually find out what account the person logged in with if they suspect something was up and with most ISP's all connections are logged.

      Also the wireless router should be logging the MAC address of the card, which uniquely identifies your computer.

      However tracking directly to you at the keyboard is a tougher feat, but by no means is it difficult to trace someone's activity on the network.

    7. #7
      Member Captain Sleepalot's Avatar
      Join Date
      Aug 2007
      Gender
      Location
      Here.
      Posts
      591
      Likes
      5
      Quote Originally Posted by Ne-yo View Post
      Also the wireless router should be logging the MAC address of the card, which uniquely identifies your computer.
      That's really probably all that you need to know, Xaqaria. There are ways to mask that I would imagine...if you don't know how, though, just keep what Ne-yo said in mind.

    8. #8
      Drivel's Advocate Xaqaria's Avatar
      Join Date
      May 2007
      LD Count
      WhoIsJohnGalt?
      Gender
      Location
      Denver, CO Catchphrase: BullCockie!
      Posts
      5,589
      Likes
      930
      DJ Entries
      9
      Okay, I've got another question. Is it possible for me as a normal user to find the IP address of someone else who is using a forum?

      The ability to happily respond to any adversity is the divine.
      Art
      Dream Journal Shaman Apprentice Chronicles

    9. #9
      FBI agent Ynot's Avatar
      Join Date
      Oct 2005
      Gender
      Location
      Southend, Essex
      Posts
      4,337
      Likes
      14
      Quote Originally Posted by Xaqaria View Post
      Okay, I've got another question. Is it possible for me as a normal user to find the IP address of someone else who is using a forum?
      no

      only possible if you control the forum (ie. admin or whatever)

    10. #10
      FBI agent Ynot's Avatar
      Join Date
      Oct 2005
      Gender
      Location
      Southend, Essex
      Posts
      4,337
      Likes
      14
      I know I've mentioned this before, somewhere
      but all you really need to do, is set a webserver up
      (you can even do it on your home machine if you have a static IP)

      plonk an image on it,
      then PM the image to your "victim"
      once he reads the PM,
      bam, his IP is in your server log

    11. #11
      Member Rakjavik's Avatar
      Join Date
      Nov 2007
      Gender
      Location
      USA
      Posts
      462
      Likes
      7
      Quote Originally Posted by Ne-yo View Post
      but by no means is it difficult to trace someone's activity on the network.
      If they are a computer a geek then this is true. Considering he is tapping into a neighbor's wifi and then saying he doesn't know networking (which means cracking WEP or WPA is out of the question), I think it's safe to assume that the neighbor is not using encryption, and therefore is a computer noob. And computer noobs are not going to be monitoring or logging their traffic. I think he's safe.

    12. #12
      ├┼┼┼┼┤
      Join Date
      Jun 2006
      Gender
      Location
      Equestria
      Posts
      6,315
      Likes
      1191
      DJ Entries
      1
      Your neighbour can also check the DHCP table and can usually see the names of the machines connected. Like, if you are called Joe, and your computer is called Joe204, your neighbour can probably figure out who you are.

      ---------
      Lost count of how many lucid dreams I've had
      ---------

    13. #13
      Dreaming up music skysaw's Avatar
      Join Date
      Jun 2007
      Gender
      Location
      Alexandria, VA
      Posts
      2,330
      Likes
      5
      I can't believe there are people setting up wireless networks all over the place who don't bother to encrypt it.

      My wife and I were having the floor redone in our basement, where our router and cable modem happen to be. We had to go offline for a few hours while the equipment was shoved into another room. To my surprise, when I went back to my computer, I was still connected to the internet. Taking a look at the available networks revealed three that were not encrypted, and zero that were. This in my quiet little residential neighborhood.
      _________________________________________
      We now return you to our regularly scheduled signature, already in progress.
      _________________________________________

      My Music
      The Ear Is Always Correct - thoughts on music composition
      What Sky Saw - a lucid dreaming journal

    14. #14
      FBI agent Ynot's Avatar
      Join Date
      Oct 2005
      Gender
      Location
      Southend, Essex
      Posts
      4,337
      Likes
      14
      Unencrypted connections are just convenient
      It's a pain in the arse to talk someone through WPA stuff over the phone

      at work, plenty of visitors request net access
      (people coming in to do talks / presentations, etc.)

      Most barely know how to work their machines (save pressing "slideshow" in powerpoint)
      so they would have no idea how to auth against our router
      and they don't like 3rd parties (ie. me) doing it for them

      We've got unencrypted Wi-Fi
      it hands out IP's on a separate sub-net to our workstations
      (so they can't access anything internally - our server, etc.)
      also, this guest subnet is allowed outgoing connections only on certain ports (web & email)

      It works well

      There's nothing inherently wrong with unencrypted Wireless
      It's no risk to us
      In fact, it's a security risk for the client, more than anything, as I (if I wished) could log everything they do, as it's not encrypted
      Last edited by Ynot; 07-16-2008 at 06:10 PM.

    15. #15
      Dreaming up music skysaw's Avatar
      Join Date
      Jun 2007
      Gender
      Location
      Alexandria, VA
      Posts
      2,330
      Likes
      5
      I'm talking more about people's home networks, which is what I'm picking up in my little patch of suburbia.
      _________________________________________
      We now return you to our regularly scheduled signature, already in progress.
      _________________________________________

      My Music
      The Ear Is Always Correct - thoughts on music composition
      What Sky Saw - a lucid dreaming journal

    16. #16
      FBI agent Ynot's Avatar
      Join Date
      Oct 2005
      Gender
      Location
      Southend, Essex
      Posts
      4,337
      Likes
      14
      same difference, really
      I used my workplace just as a real life example

      what are you afraid of, to make you secure your wireless?

      People sitting outside your house downloading torrents, leaching all your bandwidth? - restrict the outgoing ports on the unencrypted wireless - block anything except web & email (and anything else you want to grant them)

      It doesn't have to be "all or nothing"

      "Free for all" guest access for web & email
      (means your mates can bring their laptop round and have no issues connecting)

      Require authentication & encryption for anything else
      (means you are free to do anything, on any port - plus it's encrypted, so no-one can snoop on your traffic)

    17. #17
      Dreaming up music skysaw's Avatar
      Join Date
      Jun 2007
      Gender
      Location
      Alexandria, VA
      Posts
      2,330
      Likes
      5
      Quote Originally Posted by Ynot View Post
      what are you afraid of, to make you secure your wireless?
      I'm very stingy with my bandwidth. I paid for it, and I want every speck of it to myself!

      It doesn't have to be "all or nothing"
      In this case I consider "all" to be vastly superior to "nothing." Anything between requires extra work on my part. When my mates start bringing around their laptops, maybe I'll revisit the issue. -- Except I won't need to. They can just use my neighbors'!
      _________________________________________
      We now return you to our regularly scheduled signature, already in progress.
      _________________________________________

      My Music
      The Ear Is Always Correct - thoughts on music composition
      What Sky Saw - a lucid dreaming journal

    18. #18
      FBI agent Ynot's Avatar
      Join Date
      Oct 2005
      Gender
      Location
      Southend, Essex
      Posts
      4,337
      Likes
      14
      maybe I'm too nice....

    19. #19
      Member Rakjavik's Avatar
      Join Date
      Nov 2007
      Gender
      Location
      USA
      Posts
      462
      Likes
      7
      Quote Originally Posted by Ynot View Post
      same difference, really
      I used my workplace just as a real life example

      what are you afraid of, to make you secure your wireless?

      People sitting outside your house downloading torrents, leaching all your bandwidth? - restrict the outgoing ports on the unencrypted wireless - block anything except web & email (and anything else you want to grant them)

      It doesn't have to be "all or nothing"

      "Free for all" guest access for web & email
      (means your mates can bring their laptop round and have no issues connecting)

      Require authentication & encryption for anything else
      (means you are free to do anything, on any port - plus it's encrypted, so no-one can snoop on your traffic)
      This sounds like much more trouble then just putting a simple MAC filter and WEP key on your network. Sure it's still easily hackable, but only to other computer geeks. WPA is really what everyone should be doing, but it's a pain in the ass to get connected in linux to WPA.

      In my apartment complex I can see roughly 15 networks, 3 are unencryped, 6 are WEP, and 6 are WPA. So I would say that most people are using encryption.

    Bookmarks

    Posting Permissions

    • You may not post new threads
    • You may not post replies
    • You may not post attachments
    • You may not edit your posts
    •