|
Post by Rockman Striker on Apr 13, 2018 19:07:44 GMT -5
So I've used a lot of different tricks to kick my neighbor out of my wifi several times and he keeps coming back, right now the SSD is hidden, my password well protected, I've blocked some devices using their MAC addresses, reserved some ip's for my family's devices and set the range to avoid new devices to be connected, I've changed the name of my wifi to send him messages, telling him I know who he is, and other phrases to hurt his morale a little. I thought I had won this battle until he made a move I don't know how to fight. You see, I've noticed that somehow, the MAC of my router had changed, the app I use to test my wifi "Fing" shows a red flag on the router and my old router appears offline, which means that he may have replaced my router with an access point he bought or created virtually, right now I'm forced to connect to this fake APN so any changes I make to it are useless, because of that I can no longer detect any of his devices. I also suspect I'm the victim of a MITM attack wich as you may know it's dangerously illegal. So right now I'm calling my internet provider to send some help, I just hope they want to do something because, at least here in Mexico, many companies just ignore anything that's out of their immediate responsibilities. Until they send someone I would like to ask for your help, do you think there's something else I can do to stop my neighbor? (Murder is not an option BTW)
|
|
kion
Arukoitan
@kion_dgl
Posts: 193
|
Post by kion on Apr 18, 2018 11:31:51 GMT -5
(Murder is not an option BTW) Damn... Does he have any physical connection to the router? Is it a wireless access point? And can you use a wired connection until you get your wireless router sorted out? My first step would be to go dark and turn off the wifi.
|
|
|
Post by Rockman Striker on Apr 18, 2018 13:48:55 GMT -5
(Murder is not an option BTW) Damn... Does he have any physical connection to the router? Is it a wireless access point? And can you use a wired connection until you get your wireless router sorted out? My first step would be to go dark and turn off the wifi. I believe he is connected wirelessly, I usually turn off my router when I'm out of home and during night time, but I can't go completely wired since my family needs the wifi. Also, my fears turned into reality when the person from the cable company came to check the connection. He literally just replaced one of those joints that connects to the antenna, supposedly that was the problem of the mysterious slowdowns in bandwidth. When I explained the whole story to him he just said that it was "normal" for the company to somehow change the MAC address of their modems... And that's all, I didn't believe what he said but I didn't reply because he was obviously trying to avoid the subject. So what I'm going to do next is pick a day when I'll be alone at home, and my neighbor is at work, his family will be at their home, I'll remove the password from my router, decrease the strenght of the signal and change its name to something like "Do not connect to this wifi" His family is dumb enough to fall in the trap, I'll write down their MAC addresses and possibly device specifications, just in case I need that information later, when I need to prove they were stealing my wifi.
|
|
kion
Arukoitan
@kion_dgl
Posts: 193
|
Post by kion on Apr 19, 2018 8:52:44 GMT -5
Just a confirmation, I can't really think of too many ways to lock out a wireless access point besides hiding the SSID, creating a stupidly long password and potentially banning any MAC addresses. If you're really paranoid about any potential man-in-the-middle-attacks then maybe use a VPN, as it should encrypt the data between your computer and the virtual private server you connect to. So your home router only sees encrypted udp packets. One thing I'm thinking of is that your neighbor connecting to your wifi could potentially open them up to a lot of attacks as well. You could try to make it so that downloading anything will attempt to side-load in a trojan. Or allow him to connect and then throttle the connection speed so that loading any web page takes an eternity. Or if you're really evil make it so that all DNS queries get directed to www.youmadbro.net/.
|
|
|
Post by ShadyRounds on Apr 25, 2018 9:13:21 GMT -5
I really wouldn't know what else to do.
Assuming Kion is right, what you *wink*shouldn't*wink* do, is find a darknet link to illegal stuff, could be copyright software but could be the kind of shit that sent the subway mascot to prison, and side-load that to him instead of a trojan. The ISP would have to get involved then, especially if they detect it themselves. Not sure if they'd first try to take action against you, but it'd be pretty easy to trace it to the device on their end so it'll find the bastard proper. Obviously you'd never admit you redirected toward it, for all intents and purposes that was their pursuit.
Hey, it's not murder.
|
|
Trege
Poh
oro?
Meddling with Legends 1, Legends 2 and Mega Man 64 data.
Posts: 463
|
Post by Trege on Apr 25, 2018 17:10:30 GMT -5
I'm not sure how much help this will be, but have you thought of getting a custom router, like maybe purchase one that supports DD-WRT, if you're using an ISP branded router, most of them are generally terrible and it's far better to buy your own third party router and then get just a modem from your ISP, if they allow it. I've flashed my old Linksys WRT54G 6.0+ with DD-WRT firmware, however this is dangerous to do as it can brick your router if it's done incorrectly. However he's either a master at modifying devices, or maybe he's just a script kiddie of some kind and you just have a bad device, since ISP provided one's generally aren't so good. At least from my experiences.
I only have DSL so securing better and more up to date firmware on an old device worked far better for me since my internet speed never over taxes the router. Also are you using wireless security WEP, WPA1, or WPA2? WEP and WPA1 are insecure and can be hacked in around 30 seconds regardless of password complexity with *cough* tools found online. WPA2 has been exploited but it's far more difficult and way less common or easy.
If you're using WPA1 or WEP try using the reset device button on your router to see if that will fix the MAC Address usually that can be spoofed via software so he may have done that, if that succeeds I highly suggest switching to WPA2 for wireless security if it wasn't already set to that to begin with, also some default routers come with an idiotic guest access point, which when compromised can be used to modify the original device.
|
|