Router hacked. - Ubuntu

This is a discussion on Router hacked. - Ubuntu ; Timothy Daniels wrote: > "Dragomir Kollaric" wrote: > >> as to spoofing e-mails (someone said 9/10) I get spam send >> to from all over the world, and sometimes my old addresses I >> used 5-7 years ago are used ...

+ Reply to Thread
Page 4 of 4 FirstFirst ... 2 3 4
Results 61 to 68 of 68

Thread: Router hacked.

  1. Re: OT adjust ..... Re: Router hacked.

    Timothy Daniels wrote:
    > "Dragomir Kollaric" wrote:
    >
    >> as to spoofing e-mails (someone said 9/10) I get spam send
    >> to from all over the world, and sometimes my old addresses I
    >> used 5-7 years ago are used as the sender. Sometimes
    >> the inbox of my ISP-web-mail is full with "Postmaster:
    >> undelivered messages" because the recipients addresses are
    >> no longer valid.
    >>
    >> Dragomir Kollaric
    >>

    >
    >
    > Late this Spring I, also, was receiving tons of bounced email
    > that I had supposedly sent out. This went on steadily for 2 weeks.
    > Then I theorized that someone had guessed or intercepted my mail
    > account password, and I changed the password. Immediately, the
    > flood of bounced email began to subside and then die out completely
    > in 3 days. Might someone have gotten ahold of Bill Baka's email
    > password?
    >
    > *TimDaniels*
    >
    >
    >

    Tim,
    You may be correct since my ISP, Comcast hands out 8 lower case letter
    passwords that can probably be guessed.
    Passwords I use are math derived so a random guess would not work. Try
    the log of PI, to 20 decimal places, and see if anyone can guess it.
    Something like that, certainly not a child's or pet's name.
    Bill Baka

  2. Re: Router hacked.

    Moog wrote:
    > Bill Baka illuminated alt.os.linux.ubuntu by typing:
    >
    >> Moog wrote:
    >>
    >>> larrys707 illuminated alt.os.linux.ubuntu by typing:
    >>>
    >>>
    >>>> This is a semi-Ubuntu question concerning Linksys routers. Comcast
    >>>> killed my port 25 outgoing e-mail claiming I was spamming and I have a
    >>>> WRT54G, but considering a GL and DD-WRT. Has anyone else had a wireless
    >>>> compromised like this? It was in 'open' unprotected mode for a while
    >>>> after a power glitch last week and apparently a war driver got into it
    >>>> before I found out. The wireless 802.11G is for my daughter's college
    >>>> work on her laptop and I haven't been able to catch her to get her MAC
    >>>> again, and lock out all others.
    >>>> The question is mainly if anyone has used the GL and or DD-WRT and how
    >>>> straightforward it is to work with.
    >>>> Dan C need not answer this, since it is not play time for me right now.
    >>>> There is the possibility that someone could have spoofed my email but
    >>>> that seems a bit more unlikely.
    >>>> Moog? Anyone?
    >>>> Bill Baka
    >>>>
    >>>> After a really pissy hour on the phone to Comcast legal.
    >>>>
    >>>>
    >>> Interesting?
    >>>
    >>> What would I do?
    >>>
    >>> Disconnect the router.
    >>> Hard reset the Linksys.
    >>> Set it up using an ethernet cable...use a different IP range.
    >>> Hide the ESSID.
    >>> Ensure WPA-PSK is enabled and activated.
    >>>

    >> Done, again after the power incident.
    >>

    >
    >
    >
    >>> Ensure all systems on your network are OK. Wireshark is handy for
    >>> this.
    >>>
    >>>

    >> Only mine, hard wired and her laptop.
    >>

    >
    > My missus has a laptop running XP Pro (She's a teacher and has all
    > this pooftah powerpoint nonsense "for the kids").
    >

    Wonderful, tons of M$ virus magnet stuff.
    > I have a seperate IP address allocate on a different range via my
    > router for her. This way, she gains absolutely no access to our
    > home network, but can access bloody facebook and play scrabilicious
    > (or whatever the hell it's called).
    >
    > I've suggested she'd be better off doing her hair, but I just get a
    > "stfu geek" stare. ;-)
    >

    Same with my daughter. She has a Yahoo email account and no access to my
    machine from her laptop, but I get the STFU geek stuff too.
    >
    >>> Check to see if it works.
    >>>
    >>> As Dennis Said. Forget MAC Adresses. They're only really any use as a
    >>> "secondary" security. You need to get your network encrypted correctly
    >>> and ensure there's nothing hanging around within it.
    >>>
    >>>

    >> The MAC at least keeps my grandson's playstation off, but some of his
    >> friends have computers, and he says none of them are smart enough to
    >> figure it out. I also have encryption on to her laptop.
    >>

    >
    > Yup. Good policy. As I said, "secondary security"
    >

    I'm using everything the router and her laptop can handle, so there
    isn't much more.
    >
    >>> As for email spoofing. Sod it. I reckon 9/10 email users are having
    >>> their addresses spoofed.
    >>>

    >> Yup. That much I got from Comcast's legal department.
    >>

    >
    > I get numerous emails from employees at our firm saying...
    > "I've just received an email from myself".
    >
    > I tiredly ask them to "forward all headers" and without fail it is
    > some cunt in Russia spoofing the address trying to sell Viagra or
    > offer an invitation to "singlesnet".
    >

    While I am my own IT department at home, I always look at the headers of
    strange mail and try to find out where they are from, and Russia or one
    of it's old USSR countries in Eastern Europe seem to be hotbeds.
    > The best one I received had a Subject message of
    > "Get your dick out, it's friday".
    >

    I've seen some really stupid subjects along that line. I laugh and delete.
    > Now that's how you should do it spammers. ;-)
    >
    >
    >>> If they're using your network to remail, then that's different.
    >>> Wireshark should be able to let you know if this is the case.
    >>>
    >>>

    >> That's another maybe. Notice I am posting exclusively from Ubuntu now.
    >> I won't even boot windows on the 'net right now.
    >>

    >
    > Good plan. However, I would also strongly suggest you make sure you
    > don't have postfix, sendmail or a.n.other mail server set up on your
    > Ubuntu box too. These need to be monitored regularly if you do have
    > them set up. There are plenty of securiy HOWTO's available on the web
    > if you are running one.
    >

    I don't at least not intentionally. I don't serve as my daughter's host
    and have my machine isolated from hers.
    >
    >> Thanks
    >>

    >
    > No worries.
    >
    >

    I am learning from this so not a problem. I just hope someone else gets
    something useful out of all this bandwidth, but that is what discussion
    is for, right?
    Bill Baka

  3. Re: Router hacked.

    Klunk wrote:
    > I don't really buy into the thought that this was a wireless 'hack'. In
    > the time the OP's router was in default mode, what is the chance that
    > someone within wireless range of it was able to discover it, access it,
    > get onto a machine and spam from it. I would say that was pretty much
    > unlikely.
    >
    > It is more likely that there is a bot running on the M$ machine, forming
    > part of a larger botnet. Far harder to believe is that a spammer happens
    > to be sitting across the road using your connection to mail out junk.
    > It's all a bit more sophisticated than that ;-)
    >
    >

    It would almost have to be my daughter's laptop since my XP has five
    different protection programs running. She doesn't use my mail address
    but rather Yahoo mail, which might be a magnet. She did use Limewire (I
    hate it) and got the message a few months back to kill it from some
    friends who got hacked.
    I have a lot of checking to do, still.
    Bill Baka

  4. Re: Router hacked.

    Timothy Daniels wrote:
    > "Klunk" wrote:
    >
    >> I don't really buy into the thought that this was a wireless 'hack'. In
    >> the time the OP's router was in default mode, what is the chance that
    >> someone within wireless range of it was able to discover it, access it,
    >> get onto a machine and spam from it. I would say that was pretty much
    >> unlikely.
    >>
    >> It is more likely that there is a bot running on the M$ machine, forming
    >> part of a larger botnet. Far harder to believe is that a spammer happens
    >> to be sitting across the road using your connection to mail out junk.
    >> It's all a bit more sophisticated than that ;-)
    >>

    >
    >
    > I agree. I'd suspect a breach in the daughter's laptop from time spent
    > at a hotspot, allowing it to be a spam 'bot while connected to Bill's wireless
    > router, or a theft of the mail account's password.
    >
    > *TimDaniels*
    >
    >
    >

    I'm leaning toward her computer, but she never takes it out of the
    house, since she lost her digital camera while out with friends. She
    also thinks I am crazy for wanting to put all the protection on her
    computer, so I sneak in and do it while she is at college.
    Bill Baka

  5. Re: Router hacked.

    CBFalconer wrote:
    > Bill Baka wrote:
    >
    > ... snip ...
    >
    >> I'm personally NOT a wireless fan since I knew this kind of thing
    >> would happen sooner or later, but alas, even I must carry a cell
    >> phone these days. Progress?
    >>

    >
    > No you don't. I am living proof. My wife had one (which I gave
    > her after many years of moaning). After she died I ignored it, and
    > eventually got it killed. Then my daughters started to insist I
    > had one, and bought me one for Christmas. After I got sick and
    > recovered I let it lapse too, and now I never hear anything more
    > about it. No bills either. I'm down to two or three things that
    > need paying monthly, everything else is automatic, but under my
    > control. One is the POTS telephone.
    >
    >

    That is my mindset, but my wife is still with me and thinks *I* need it
    for my 100 mile bicycle trips. I did them as a teenager in the 1960's
    and never died for lack of a cell phone. I hate being out in the wild
    and having a spam phone call, which seems to happen a lot since I got a
    VISA card. I am an engineer, but not a GEEK.
    Bill Baka

  6. Re: OT adjust ..... Re: Router hacked.

    "Bill Baka" wrote:
    > Timothy Daniels wrote:
    >> "Dragomir Kollaric" wrote:
    >>
    >>> as to spoofing e-mails (someone said 9/10) I get spam send
    >>> to from all over the world, and sometimes my old addresses I
    >>> used 5-7 years ago are used as the sender. Sometimes
    >>> the inbox of my ISP-web-mail is full with "Postmaster:
    >>> undelivered messages" because the recipients addresses are
    >>> no longer valid.
    >>>
    >>> Dragomir Kollaric
    >>>

    >>
    >>
    >> Late this Spring I, also, was receiving tons of bounced email
    >> that I had supposedly sent out. This went on steadily for 2 weeks.
    >> Then I theorized that someone had guessed or intercepted my mail
    >> account password, and I changed the password. Immediately, the
    >> flood of bounced email began to subside and then die out completely
    >> in 3 days. Might someone have gotten ahold of Bill Baka's email
    >> password?
    >>
    >> *TimDaniels*
    >>
    >>
    >>

    > Tim,
    > You may be correct since my ISP, Comcast hands out 8 lower case letter
    > passwords that can probably be guessed.
    > Passwords I use are math derived so a random guess would not work. Try
    > the log of PI, to 20 decimal places, and see if anyone can guess it.
    > Something like that, certainly not a child's or pet's name.
    > Bill Baka


    A hacker's dictionary/algorithm probably has the log of Pi, the square
    of Pi, the square root of both Pi and Pi/2 out to 32 places. In my
    situation, though, I use a combination of words taken from 3 unrelated
    languages, those words having first been declined (in the linguistice sense)
    before being combined. In laziness, I also use the same Username at
    several mail services, some of which are free and browser-based, and
    sometimes I enter the domain and password that are incorrect for the free
    browser-based mail service but which are appropriate for my ISP's POP3
    account. The low security for logging-in at the free website may have
    compromised my password for the higher-security ISP account when I
    made that mistake. In any event, there are many ways for a hacker to
    get an email password, so it's worth a try to just change your password
    and see if the bounced spam abates.

    *TimDaniels*



  7. Re: Router hacked.

    "Bill Baka" wrote:
    > CBFalconer wrote:
    >> Bill Baka wrote:
    >>
    >> ... snip ...
    >>
    >>> I'm personally NOT a wireless fan since I knew this kind of thing
    >>> would happen sooner or later, but alas, even I must carry a cell
    >>> phone these days. Progress?
    >>>

    >>
    >> No you don't. I am living proof. My wife had one (which I gave
    >> her after many years of moaning). After she died I ignored it, and
    >> eventually got it killed. Then my daughters started to insist I
    >> had one, and bought me one for Christmas. After I got sick and
    >> recovered I let it lapse too, and now I never hear anything more
    >> about it. No bills either. I'm down to two or three things that
    >> need paying monthly, everything else is automatic, but under my
    >> control. One is the POTS telephone.
    >>
    >>

    > That is my mindset, but my wife is still with me and thinks *I* need it
    > for my 100 mile bicycle trips. I did them as a teenager in the 1960's
    > and never died for lack of a cell phone. I hate being out in the wild
    > and having a spam phone call, which seems to happen a lot since I got a
    > VISA card. I am an engineer, but not a GEEK.
    > Bill Baka


    Your wife is worried about you having an accident or a heart attack
    and not being able to call for help. Take the cell phone, but just keep
    it turned off unless you need it.

    *TimDaniels*



  8. Re: Router hacked.

    ArameFarpado wrote:
    > > Has anyone else had a wireless compromised like this?

    > only the persons that reject anything wireless does not.
    > wep, wap, hiden ssid... all craked in 5 to 15 minutes.
    > wireless = no, thank you...


    So what's the best way to go about providing a "hot spot"
    for my neighbors and passing service personel?

    Tandem routers?
    Or what?

    Alvin in AZ
    ps- I use a wire

+ Reply to Thread
Page 4 of 4 FirstFirst ... 2 3 4