wi fi

How to check if someone is using your Wi-Fi

There are many reasons why you would want to check if someone is using it your network (Wi-Fi) without permission. It may have already happened and you can usually tell by the speed of your connection starting to “crawl.” Of course, we should also mention the consequences for their safety your as an experienced and malicious user can somehow gain access to your network files. You could still face legal consequences if someone uses your connection for hacking or other illegal activities.

router Wi-Fi Wi-Fi Wi-Fi Wi-Fi Wi-Fi wireless Internet Access Included

Many of you may have already taken some basic precautions when setting up your wireless network and have a way to deal with these issues. Below is a short guide that is intended primarily for novice users who need help in verifying whether their Wi-Fi is stolen.

Check the devices connected to your

The first thing you need to do is to log in to your router's management console by typing the IP address in the browser's address bar (usually: 192.168.0.1 or 192.168.1.1 depending on which router you are using.) If you do not know the default address your router go to the command line from

Start / Run / Search for cmd run the exe and type ipconfig. The address should be next to the Default Gateway of your local network.

Alternatively, if you use Mac, you can find the default address by going to the Network under System PreferencesSystem Preferences). The IP should be listed right next to "Router:" if you are using Ethernet, or by clicking on "Advanced…" and go to the "TCP / IP" tab if you are using Wi-Fi. Then enter the address in the browser and you will be asked for your login details - unless you have changed the default settings the username and password should be on the back of your router. If you do not find it download this file default names and passwords (PDF). Alternatively you can search hereOr from here or search for it on Google. We recommend that you change your name and password immediately.

Μόλις δείτε το εσωτερικό της κονσόλα διαχείρισης του δρομολογητή σας αναζητήστε μια ενότητα που θα σας εμφανίσει τις συνδεδεμένες συσκευές ή την κατάσταση της ασύρματης λειτουργίας. Στο router που χρησιμοποιήσαμε βρήκαμε τη λίστα στην ενότητα DHCP List. Sometimes it is available from the Status/Wireless path, and you will find it as “Attached Devices”.

router

Check the list if there is an intruder among the devices listed. You can find your computers MAC / IP address from the Command Prompt by typing, 'ipconfig /all' The MAC address will appear as a physical address.

What am I doing next?

The best and simplest solution is to create a powerful password using WPA2. WPA - WEP encryption is very easy to break and should be avoided if possible. There are some other methods you can use to enhance your security, such as disabling your SSID (this prevents your network name from appearing on nearby Wi-Fi devices), or setting up a filter to get the ability to block devices from the MAC address. This, of course, will not stop an experienced intruder but will delay it.

Τα παραπάνω βήματα θα πρέπει να είναι περισσότερο από αρκετά για τους περισσότερους χρήστες, αλλά αν χρειάζεστε πραγματικά να εντοπίσετε ποιος έχει παραβιάσει το δίκτυό σας και να εντοπίσετε την φυσική του θέση μπορείτε να χρησιμοποιήσετε ένα εργαλείο που ονομάζεται MoocherHunter. Θα χρειαστεί να κάψετε ένα Live CD και να εκκινήσετε τον υπολογιστή σας από αυτό. Από το Live CD θα μπορέσετε να εντοπίσετε όλου τους μη εξουσιοδοτημένους χρήστες του ασύρματου σας δικτύου. Σύμφωνα με την περιγραφή του προ, it detects traffic sent across the network and can find the source with an accuracy of 2 meters.

MoocherHunter is included in the OSWA Assistant. You can download it OSWA Assistant from here.

Alternatively you can use the application Wireless Network Watcher. It will alert you whenever someone connects to your network.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

One Comment

Leave a Reply
  1. Because the static IP address is likely from the attacker, if your router also has the ability to view the ARP table or even better some way of viewing statistics per IP address (eg NetFlow) then you can use these methods to find out.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).