Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Ask Slashdot: Dealing With an Advanced Wi-Fi Leech?

Soulskill posted about a year and a half ago | from the call-the-internet-police dept.

Networking 884

An anonymous reader writes "Recently, I had found out (through my log files) that my wireless router was subject to a Wi-Fi Protected Setup (WPS) brute force PIN attack. After looking on the Internet and discovering that there are indeed many vulnerabilities to WPS, I disabled it. After a few days, I noticed that I kept intermittently getting disconnected at around the same time every day (indicative of a WPA deauthentication handshake capture attempt). I also noticed that an evil twin has been set up in an effort to get me to connect to it. Through Wi-Fi monitoring software, I have noticed that certain MAC addresses are connected to multiple WEP and WPA2 access points in my neighborhood. I believe that I (and my neighbors) may be dealing with an advanced Wi-Fi leech. What can I do in this situation? Should I bother purchasing a directional antenna, figuring out exactly where the clients are situated, and knocking on their door? Is this something the local police can help me with?"

cancel ×

884 comments

Sorry! There are no comments related to the filter you selected.

i like to limit my DHCP scope (0)

alen (225700) | about a year and a half ago | (#42959051)

very simple but i think it works. i limit mine to 5-10 IP's. usually a few more than the number of devices i have because iOS devices can be a bit flaky with going to sleep and keeping the IP while another device grabs it as well

Re:i like to limit my DHCP scope (4, Informative)

fruitbane (454488) | about a year and a half ago | (#42959093)

Why even do that? Simply set up a list of accepted MAC addresses and give them assigned IPs. Don't provide any service to a MAC address not matching known. Unfortunately, that only stops your router/AP from handing out IPs. They can still eavesdrop and work on listening in on traffic.

Re:i like to limit my DHCP scope (4, Insightful)

h4rr4r (612664) | about a year and a half ago | (#42959105)

So then he sets his MAC address to one on the allowed list. Not exactly a tough thing to do.

Re:i like to limit my DHCP scope (2)

fruitbane (454488) | about a year and a half ago | (#42959151)

At least it slows him down. He has to find and grab an accepted MAC, and you'll know he's trying to connect as soon as you have a collision on the DHCP.

Re:i like to limit my DHCP scope (2, Insightful)

faedle (114018) | about a year and a half ago | (#42959167)

Doubt it would even slow him down. Some of the semi-automated leecher tools do this automatically already.

Re:i like to limit my DHCP scope (-1)

paragonc (813536) | about a year and a half ago | (#42959107)

Exact fix. Thread closed...

Re:i like to limit my DHCP scope (1)

h4rr4r (612664) | about a year and a half ago | (#42959147)

So a fix that does not work is what you are suggesting?

You do know that changing you MAC address is not hard, right?

Re:i like to limit my DHCP scope (1)

allo (1728082) | about a year and a half ago | (#42959415)

why? Just pick a unused static ip from (or even not from) the dhcp-range.

Re:i like to limit my DHCP scope (1)

Anonymous Coward | about a year and a half ago | (#42959221)

If any attacker goes through the effort to crack wpa1/ TKIP, a MAC filter will certainly be an effective deterrent - or not

Re:i like to limit my DHCP scope (0)

Anonymous Coward | about a year and a half ago | (#42959229)

Exact fix. Thread closed...

I usually feel vaguely guilty taking advantage of holes in people's technical knowledge, but for some reason that guilt quickly evaporates as soon as they exhibit dismissiveness.

Re:i like to limit my DHCP scope (0)

Anonymous Coward | about a year and a half ago | (#42959379)

Noob.

Re:i like to limit my DHCP scope (1)

alen (225700) | about a year and a half ago | (#42959163)

can't remember of the top of my head, but i've seen some devices act very flaky or not work with the MAC filtering enabled. and then i have it set up where my inlaws and I have the same SSID and password so that visiting each other's networks is very easy

Re:i like to limit my DHCP scope (5, Informative)

ios and web coder (2552484) | about a year and a half ago | (#42959341)

Why even do that? Simply set up a list of accepted MAC addresses and give them assigned IPs. Don't provide any service to a MAC address not matching known. Unfortunately, that only stops your router/AP from handing out IPs. They can still eavesdrop and work on listening in on traffic.

I use reserved MAC addresses and a non-trivial WPA2 password. The router won't connect any unknown MAC addresses.

That seems to work for me.

If they crack that, they aren't leeches. They are crooks. Call the FBI.

Re:i like to limit my DHCP scope (4, Informative)

faedle (114018) | about a year and a half ago | (#42959127)

Doubt that would work. The leecher has already demonstrated a knowledge of layer-2 attacks against 802.11, I doubt limiting your DHCP scope is going to stop them. They'll just null handshake one of your devices off the WLAN.

Re:i like to limit my DHCP scope (0)

Anonymous Coward | about a year and a half ago | (#42959143)

You do realize you don't need DHCP to get an IP address on a network, right?

Re:i like to limit my DHCP scope (1)

alen (225700) | about a year and a half ago | (#42959189)

if i have a device not work for some reason and i see an IP conflict then i'll know right away

my wife is always on her iphone on the wifi. the kids are always streaming something

Re:i like to limit my DHCP scope (2, Insightful)

Anonymous Coward | about a year and a half ago | (#42959329)

if i have a device not work for some reason and i see an IP conflict then i'll know right away

Unless you're setting your subnet mask to only be 10 or so addresses, I'd just pick an address outside of your DHCP scope and I'd never conflict. You're treating DHCP as a security measure when it's a convenience measure.

captcha: gateway. How fitting.

Re:i like to limit my DHCP scope (0)

HomelessInLaJolla (1026842) | about a year and a half ago | (#42959235)

You could pump

Figure out where he is located (5, Funny)

Anonymous Coward | about a year and a half ago | (#42959055)

And punch him in the nose.

Easy to stop (1)

Anonymous Coward | about a year and a half ago | (#42959067)

Use a VPN, and firewall off all access except the VPN connection.

Change your WPA keys (5, Informative)

supersat (639745) | about a year and a half ago | (#42959071)

WPS works by giving out your WPA keys, so if they've gotten in once through WPS, they will continue to have access.

Re:Change your WPA keys (3, Informative)

Anonymous Coward | about a year and a half ago | (#42959219)

I hope parent meant WPA2 rather than WPA.

And use a strong pass phrase with a non-dictionary-word ssid.

Does your router support captive portal? (1)

Anonymous Coward | about a year and a half ago | (#42959077)

You can try turning that on with Radius authentication or any authentication. That can keep the leech from your network. An evil twin setup could be a dangerous thing. Instead of buying a directional antenna yourself, you can call authorities and let them use one of their own!

simple (4, Funny)

polar red (215081) | about a year and a half ago | (#42959085)

UTP

Re:simple (1)

radiumsoup (741987) | about a year and a half ago | (#42959153)

best. answer. ever.

Re:simple (0)

Anonymous Coward | about a year and a half ago | (#42959303)

kind of ruins the wireless aspect wouldn't you say?

Re:simple (0)

Anonymous Coward | about a year and a half ago | (#42959321)

Have to agree. If you have the option of non-wireless, then specifically use the wired connection.

This doesn't work for iOS of course, but it lowers the number of devices in which an attack can be made against

Use squid (5, Funny)

h4rr4r (612664) | about a year and a half ago | (#42959087)

Setup squid and redirect all web traffic through it. Replace all images on machines that are not yours with goatse.

Re:Use squid (-1)

Anonymous Coward | about a year and a half ago | (#42959403)

This configuration guide will get you started with all images upside down:

http://www.ex-parrot.com/~pete/upside-down-ternet.html

Local police won't be much help (3, Funny)

attemptedgoalie (634133) | about a year and a half ago | (#42959089)

You can give them satellite images of the house of the person that stole your identity, and they won't drive over for that.

So for something involving log files and such? Not a chance.

You should redirect all network traffic to goatse for a week, and just use a 3G hotspot while your normal one kills the thief's eyes.

Re:Local police won't be much help (0)

Anonymous Coward | about a year and a half ago | (#42959243)

Sure you can get local police interested.

Set up an access point, have it connect to a box that routes everything through TOR, and run a web proxy that redirects every website he tries to load to a kiddie porn site.

THEN call the cops, and let them know what he's been looking at. I guarantee they'll be quite interested.

Re:Local police won't be much help (1)

yurtinus (1590157) | about a year and a half ago | (#42959369)

..of course it won't take long for them to find out who set up the redirects and is actually responsible for the kiddie porn.

WIFi direction finding (0)

mrcaseyj (902945) | about a year and a half ago | (#42959095)

You may be able to find the direction of a WiFi signal by just standing with your laptop held out in front of you and turning slowly until the signal strength drops as your body blocks the signal. Do multiple turns to rule out random signal drops.

Re:WIFi direction finding (1)

radiumsoup (741987) | about a year and a half ago | (#42959179)

get a yagi antenna - it's a good excuse to get one ;)

If he joins your network... (4, Funny)

Picass0 (147474) | about a year and a half ago | (#42959097)

...I think that means he's consenting to letting you administrate his system. I suggest you do so.

Re:If he joins your network... (5, Insightful)

Anonymous Coward | about a year and a half ago | (#42959199)

Not necessarily effective if his intention isn't web browsing. Internet is cheap. It sounds like an elaborate attempt to conceal illicit activity to me.

You could troll them in return. (4, Funny)

Frobnicator (565869) | about a year and a half ago | (#42959099)

Log in to the Evil Twin network. Start a bunch of illegal torrents and "accidentally" alert the appropriate parties by IP address. Some appropriate in-theater movies and the MPAA would be a good start.

Re:You could troll them in return. (2)

amorsen (7485) | about a year and a half ago | (#42959215)

The Evil Twin network likely doesn't have Internet access. Even if it does, it is probably using one of the other nearby wifi networks for connectivity.

Re:You could troll them in return. (0)

Anonymous Coward | about a year and a half ago | (#42959255)

Change the WPA key on your real network, then log in to the Evil Twin network. Start a bunch of illegal torrents and "accidentally" alert the appropriate parties by IP address. Some appropriate in-theater movies and the MPAA would be a good start.

Of course if he's actually all that "advanced" the evil twin network doesn't have an internet connection, and will shut itself down as soon as it captures an authentication attempt. That way your laptop will connect to the good twin after a few seconds, and a less-paranoid user would never be the wiser that their key had been captured.

Re:You could troll them in return. (4, Interesting)

Nerdfest (867930) | about a year and a half ago | (#42959325)

If it has internet access and you don't feel like waiting for the MPAA to be their usual selves, sign up for a new gmail account and send a threat letter to a high ranking government official. You'll get a far faster and more dramatic response. You can be pretty much guaranteed that the issue will be investigated.

Dangerous territory... (0)

Anonymous Coward | about a year and a half ago | (#42959103)

assuming, of course, that you neglected to get permission to research the other access points. You should not admit to connecting to or monitoring any network to which you have not been granted access.

This weakens your case, as it takes away the evidence for massive wrongdoing.

My advice is to keep your efforts under your hat until you have solid proof that doesn't require your own unauthorized access of remote networks.

Re:Dangerous territory... (0)

Anonymous Coward | about a year and a half ago | (#42959391)

You actually don't need to connect to an access point to see what MAC address are associated with it. And its pretty difficult to conceal that information due to the way wireless ethernet works.

Lynch Mob (1)

Anonymous Coward | about a year and a half ago | (#42959109)

Get your neighbors together, form a lynch mob.

Backtrace him (0)

Anonymous Coward | about a year and a half ago | (#42959111)

Backtrace him and report him to the cyber police.

dan.

No really, don't! (0)

Anonymous Coward | about a year and a half ago | (#42959117)

Woohoo, first post! Honestly, if someone is screwed up enough to waste their time to do this, do not confront them in person. At the very least they will just weasel and carry on, but you may be opening yourself up to harassment or worse, by identifying yourself to them.

Don't need a directional antena (1)

Anonymous Coward | about a year and a half ago | (#42959119)

You can download utilities to show the strength of signals on your laptop or other portable device. Simply walking around the neighborhood with the laptop will give you a darn good idea where it originates. A box of matches is the only other tool you will need.

Re:Don't need a directional antena (0)

Anonymous Coward | about a year and a half ago | (#42959175)

Free one here: http://www.intelliadmin.com/index.php/free-download/?filename=wifistrength.exe

But there are about eleventy billion other ones that will get the job done. Some for Android, none for an iOS as far as I am aware.

Some quick basics (4, Insightful)

Pubstar (2525396) | about a year and a half ago | (#42959121)

The first thing would obviously be MAC whitelisting on the router, though if he is smart enough, he would just spoof his MAC to one of the ones on your network, so its unlikely it would stop him. Depending on where you need your wireless router, have you considered turning down the radio strength and putting the router in an area where it covers where you want to use it without the WiFi signal going too far outside the bounds of your house?

Why lose your time? (3, Insightful)

ruir (2709173) | about a year and a half ago | (#42959133)

Lets hope this article is just a marketing scheme. Anyway, in case it is genuine: Somebody has been freeloading, so what? You have got two options: 1) upgrade your security. double up encryption with MAC authorization. Hide your SSID. Maybe even going to digital certificates.Use only encrypted communications protocols. Many other options. Many time invested. 2) Setup a honeypot. Something open or better yet with poor security. Let him break, monitor the activity, eventually you will get a his personal data. Then decide on the course of action. Cheers

Re:Why lose your time? (1)

Pubstar (2525396) | about a year and a half ago | (#42959203)

Hiding SSID? You're joking right? Its trivial to find it - http://www.metageek.net/forums/showthread.php?3531-Download-inSSIDer-2.0-Beta-1 [metageek.net]

Not that hard using this program. My friend is just a script kiddy, but he can use BackTrack Pro 5 to break into almost any wireless network in 15 minutes (WEP) or 2 days (WPA2 using rainbow tables)

Power & antenna placement (4, Interesting)

hottoh (540941) | about a year and a half ago | (#42959145)

-Reduce transmit power
-Move or buy a directional antenna

Have time on your hands?
http://www.ex-parrot.com/~pete/upside-down-ternet.html

Re:Power & antenna placement (4, Interesting)

Sarten-X (1102295) | about a year and a half ago | (#42959267)

That link [ex-parrot.com] is exactly what I came to post. It's clearly overkill, but overkill is the perfect tool to show someone that they are hopelessly outclassed and they should seriously reconsider their actions.

Shut off your radio. (5, Insightful)

faedle (114018) | about a year and a half ago | (#42959149)

If they're going to go through the trouble of setting up a honeypot, you might was well give up and just shut the radio off and run 100% wired.

Or, go rogue yourself and capture all his traffic. Bonus points if you rate-limit the wireless to effectively have no bandwidth.

The local cops? If your local police department is anything like mine, they don't even send out officers to investigate real property crimes like theft anymore. They'll just laugh at your little WiFi problem.

wired (2)

epyT-R (613989) | about a year and a half ago | (#42959159)

You could try leaving the access point open and partitioning it with an ipsec segment. Deny any other connection attempts to the interface. Otherwise just hardwire it and be done with it. Wireless will never be secure. You'll just end up fighting a war of attrition, and that 16yo hax0r has much more free time than you do.

Mac Whitelist (0)

Anonymous Coward | about a year and a half ago | (#42959161)

That is why I use MAC Authentication in addition to encryption. It's a pain to manually add each address for every new gadget but it give me great and easy transparency for who is using my stuff.

Re:Mac Whitelist (1)

Pubstar (2525396) | about a year and a half ago | (#42959251)

MAC spoofing is very trivial. It would not stop someone doing these types of attacks on wireless networks.

Re:Mac Whitelist (1)

wjousts (1529427) | about a year and a half ago | (#42959295)

Yeah, sure is a pain when you add new device, especially since it's completely ineffective at keeping anybody out.

fair trade (3, Funny)

Anonymous Coward | about a year and a half ago | (#42959165)

You're giving him cancer, he's using some of your wifi. Just segregate your personal network from the wifi network and see if you have QoS options to limit how much you share. Can't we all just get along? ;)

I've used Wifi Analizer (3, Insightful)

eksith (2776419) | about a year and a half ago | (#42959169)

On my Android phone, it will detect the closest Wifi signals and you may be able to pinpoint where exactly this evil twin is. A directional antenna may help, but without knowing exactly where to direct it to, you may be aiding the leech. You can try disabling SSID broadcast and reducing transmit power.

No one will trouble themselves this much just to avoid paying a monthly fee and just by the fact they're knowledgable in these means they've spent a lot of time online already. My guess is that this individual is conducting illegal activities through yours and your neighbor's connections, so you or your neighbors may get a visit from law enforcement pretty soon.

Re:I've used Wifi Analizer (0)

Anonymous Coward | about a year and a half ago | (#42959271)

This will help narrow down.

Make yours less desirable, let your neighbors know what is going on....no point in going over kill, just make yours hardest to get on...is wifi needed in your home (or would wired do)...anything that you do can be broken on a wifi network..once wired it's much harder.

Buy a directional antenna (2)

ZaMoose (24734) | about a year and a half ago | (#42959171)

...but only if it comes with a cool pings-like-the-motion-detectors-in-Aliens handset, as where's the fun in not having that?

sniff em out. (0)

Anonymous Coward | about a year and a half ago | (#42959187)

Set up a firewall that all your data is routed through. Then sniff passwords from it.

Have fun with them (0)

Anonymous Coward | about a year and a half ago | (#42959195)

There's always upside-down ternet [ex-parrot.com] .

Oh come on... (5, Insightful)

lesincompetent (2836253) | about a year and a half ago | (#42959197)

Do i really have to say it? WPA2, 63 characters pwd.

Sounds worse than a leech (3, Insightful)

Rob the Bold (788862) | about a year and a half ago | (#42959205)

Wouldn't a leech just look for an open access point? One with a fast connection would be a bonus.

Your interloper would seem to be doing something more nefarious. Why does a simple leech need an evil twin?

Is your local constabulary at all competent in this sort of matters, or are they the kind that go around wardriving for open access points? Because it's gonna suck to try to explain the problem if they don't have a clue, but something's up, and to me it sounds like something leaning toward the criminal.

I think I'd get the directional antenna. Maybe you're dealing with the neighbor's 12 year old, so just alerting the parents could do the trick. If it's your local psycho, that's another story.

Re:Sounds worse than a leech (3, Insightful)

gstoddart (321705) | about a year and a half ago | (#42959313)

Is your local constabulary at all competent in this sort of matters

Do you seriously need to ask this?

Have you seen any evidence anywhere that the local police are knowledgeable or interested in such things? If so, where?

Change the SSID (4, Funny)

Anonymous Coward | about a year and a half ago | (#42959207)

To FBI surveillance van.

MAC Filter (0)

Anonymous Coward | about a year and a half ago | (#42959211)

set up a MAC address filter

lock it down (1)

Nex6 (471172) | about a year and a half ago | (#42959213)

i would, lock everything down. starting with wpa2 with a really long random string, I would even change the wireless network SSID to a random string.
(part of the crypto use the ssid in the hash)

I would add, mac address auth, change all my DHCP settings. and even hide my network.

just to start, off the top of my head....

-Nex6

If you find him... (4, Insightful)

ShieldW0lf (601553) | about a year and a half ago | (#42959225)

If you find him, give him props and buy him a beer and ask him to share how he's doing what he's doing with you. Sounds like some pretty cool shit.

Re:If you find him... (5, Funny)

Anonymous Coward | about a year and a half ago | (#42959347)

And THEN break his legs.

Right?

start knocking on doors (5, Funny)

radiumsoup (741987) | about a year and a half ago | (#42959231)

start knocking on doors and asking your neighbors if they would mind terribly if you spoke with their 15 year old son for a few minutes, because you've determined he's been hacking your wifi. Eventually, you'll hit the right house. For the wrong houses, act confused and say you must have miscalculated by a house or two, and that you're sorry. Bring cookies to show you're not an ass, though.

Filter your MAC addresses (0)

Anonymous Coward | about a year and a half ago | (#42959233)

I like to limit the devices that are allowed to connect to my router to only the MAC addresses that I have selected. It's a little extra work to setup but does provide some additional security (unless of course the culprit decides to spoof one of your MAC address as well).

Some ideas (3, Informative)

Proudrooster (580120) | about a year and a half ago | (#42959239)

Lock incoming connections down by MAC address and disable your SSID. This will probably make them go away. Also, run WPA2+AES and pick a longish WIFI key.

If you have an ASUS Dark Knight router you can setup multiple SSIDs (guest networks) that disconnect every 60 seconds and name them "StopStealingMyWifi". This way you real SSID is hidden and your multiple guest networks are visible, but are unusable. You can also set hours of operations for your radios on the ASUS and turn off your radios at night and when you are not home. Lastly, if you are running dual band, turn off the 2.4 Ghz and run on the 5Ghz band. The 5Ghz signal travels poorly outside your home. WIFI is tough to secure with all of the WIFI hacking tools, but get a good router and rotate shield frequencies and should go away.

Lastly, here is an article on the subject.... this article disagrees with me on disabling your SSID and I am sure others will have an opinion....
http://www.wikihow.com/Secure-Your-Wireless-Home-Network [wikihow.com]

Re:Some ideas (2, Insightful)

Anonymous Coward | about a year and a half ago | (#42959399)

As I'm sure somebody else will point out, SSID hiding won't hide the fact that the network is there. The only good thing that you mentioned is turning off your wifi at night, but that's not necessarily a real solution (servers and such like to do things at night, however if you're running servers off of wifi and they are at all important there's something wrong with you anyways).

Re:Some ideas (1)

jkflying (2190798) | about a year and a half ago | (#42959411)

Even if the SSID is disabled it is still easy to sniff the name.

Whitelist!? (0)

dittbub (2425592) | about a year and a half ago | (#42959241)

I use a MAC filter whitelist. You can too :)

Use a VPN over your Wi-Fi (0)

Anonymous Coward | about a year and a half ago | (#42959247)

Let the Wi-Fi network only provide access to your VPN server -- no direct Internet access. This way, getting into the Wi-Fi has not (yet) led to any useful connectivity. Use strong passwords and encryption to prevent the VPN layer from being broken as well.

Stealing Electricity (4, Insightful)

CambodiaSam (1153015) | about a year and a half ago | (#42959259)

If someone had an extension cord plugged into my outside outlet and it ran to their house to steal power, I would walk over, knock on the door, and ask them to stop it. And yes, I would also unplug it.

If you have the means to determine where they are it's worth asking them to stop. That alone might change their attitude toward poking at networks.

Scanning Software (0)

Anonymous Coward | about a year and a half ago | (#42959263)

Use any scanning utility on your laptop and walk around the neighborhood until you find him.

Daily disconnects (1, Insightful)

A Friendly Troll (1017492) | about a year and a half ago | (#42959275)

I noticed that I kept intermittently getting disconnected at around the same time every day (indicative of a WPA deauthentication handshake capture attempt).

No, that is only indicative of perfectly normal behaviour in most of the world, since your connection is reset (and your IP changed) every 24 hours.

go to CAT 5 (2)

alen (225700) | about a year and a half ago | (#42959277)

you can defeat almost every trick like mac filtering or limiting dhcp scope

your best bet is to go back to wired and not send your data over radio waves

options (1)

ags1 (1883204) | about a year and a half ago | (#42959279)

1) Drop the power on the AP so the signal can't reach the neighbor. 2) Turn off wifi security, route all traffic to a vpn server, require all connections to route through a vpn server. 3) Use ethernet.

Let him connect (2)

sjames (1099) | about a year and a half ago | (#42959285)

Transparently redirect everything to goatse.

WPA2-Enterprise (3, Informative)

Rinisari (521266) | about a year and a half ago | (#42959287)

* Use enterprise auth to a RADIUS server with an LDAP backend?
* Lower the transmit power to something that just works within your place?
* Use just A or just B or just N? Maybe they're on older tech?
* Configure your router not to well, route. Use it as just an AP and you have to manually set the IP info on your machines, and the router is not *.*.*.1 on the network.
* Do the above, but use an external VPN for all of your traffic. A static route in the router gets you onto the VPN.
* Change your SSID to something threatening to indicate that you're onto them and that you asked Slashdot how to make them stop?

WPA2 with PSK (0)

Anonymous Coward | about a year and a half ago | (#42959291)

Change your WAP to WPA2 with a long preshared key.
If you can, also convert to IPv6, that oughta throw him for a loop :)
Use UTP where you can and turn off your wifi when not in use.

Be enlightened (3, Insightful)

Kohath (38547) | about a year and a half ago | (#42959299)

Change your SSID to "Do_not_steal_my_WiFi". It's the enlightened approach -- the same approach that the "Gun Free Zone" and "Drug Free Zone" people use. Only backward, ignorant people would disagree.

Give him a warning (1)

gman003 (1693318) | about a year and a half ago | (#42959305)

Rename your SSID to "if you don't stop trying to hack in, I will call the police" (or whatever will fit). That should be enough of a hint.

Turn it off and go wired. (0)

Anonymous Coward | about a year and a half ago | (#42959309)

They won't be able to leach.

Not the Cops. (1)

godel_56 (1287256) | about a year and a half ago | (#42959317)

It's obvious that the local police would be useless, but what about the FCC or the FBI if this character's actions are so extensive?

Change Password (5, Interesting)

pellik (193063) | about a year and a half ago | (#42959345)

Brute force attacks take time, lots of time. Just start changing your key every week and he will probably go away. Having your computer run 96 hours to get a password that then changes 72 hours later just isn't worth it, even for a criminal. If he keeps at it then someone just enjoys the challenge, and you should hunt them down just for the mystery.

something the local police can help me with? (1)

Michael Woodhams (112247) | about a year and a half ago | (#42959351)

Why ask us this? Why not ask them?

Obligatory XKCD (0)

Anonymous Coward | about a year and a half ago | (#42959357)

http://xkcd.com/341/

Allow access... (2)

jameshofo (1454841) | about a year and a half ago | (#42959359)

well depending on the level of control you have, I'd grant them access and then just blackhole the traffic. The lecher will eventual self discriminate.

Its time for WPA-Enterprise (0)

Anonymous Coward | about a year and a half ago | (#42959371)

Honestly unless you want to start getting really in depth with your tracking skills its time to move to WPA with certificates.. I'm not sure if any of the home routers have firmware's that you can load up that will allow for WPS with certificates. Youll have to setup a CA and the like but hey your on slashdot so I'm sure you've got the basic knowledge of how to search for a solution.

As for enforcement this particular individual is committing a felony (if you live in the US) and the local law enforcement may be interested if you can get to their cyber crime department.

on a side note you could just play games with him setup a honeypot or maybe the classic squid upside down web pages.

the only security is a hardline (1)

dgoldman (244241) | about a year and a half ago | (#42959383)

Not the answer you want but I'd ditch the wireless thing altogether.
You got savvy hostiles. Is it really worth the fight and uncertainty?

I don't get it (5, Insightful)

chord.wav (599850) | about a year and a half ago | (#42959419)

Some neighbor comes in good faith and opens his digital life to you, so you can MITM him and this is how you react? That is rude man. I think that guy deserves an apology sent from one of his social networks accounts.

Load More Comments
Slashdot Login

Need an Account?

Forgot your password?