Page 1 of 1

wireless network connection to 'linksys' (18%)

Posted: Thu May 14, 2009 1:28 pm
by wiab4355
what's the percentage of exactly and is 18% as bad as it sounds?

Re: wireless network connection to 'linksys' (18%)

Posted: Thu May 14, 2009 2:33 pm
by AK Dave
18% is an irrelevant statistic. Your wifi kernel module and nm-applet are reporting some number based on signal-to-noise. With my laptop at home, I can be in the exact same spot and use one kernel and its associated linux kernel module, and see "18%" reported. Same hardware, same location, differnet kernel&module, and see "95". Or rmmod the linux module and use ndiswrapper and see a totally different number. None of which has anything to do with the fact that REGARDLESS my wifi speed is the same.

What is more troubling is the fact that your router is reporting itself as "linksys".

Re: wireless network connection to 'linksys' (18%)

Posted: Fri May 15, 2009 1:33 am
by wiab4355
Thanks for the first response, but the second...

Why troubling?

Re: wireless network connection to 'linksys' (18%)

Posted: Mon May 18, 2009 4:55 pm
by AK Dave
wiab4355 wrote:Thanks for the first response, but the second...

Why troubling?
A router that broadcasts itself as "linksys" suggests that the router's owner/operator hasn't put much effort into wifi security, as the first thing you usually change when you diligently configure your router's settings are its name, the network name, and the router's static IP.

One of my neighbors has a linksys router. I know this because his network says "linksys" when any of my wireless devices see it. His network is actually unsecured, which doesn't surprise me. People who leave their network name as "linksys" typically either have unsecured, or poorly secured (WEP) networks. So I can login to his wifi network any time I feel like it. Since I know his router is linksys, I also know that by default it gives itself the static IP of 192.168.1.1 so once I'm in his unsecured network I can be at the admin prompt for his router because he didn't bother to change the static IP. Since I know the router's IP, I also know its model (WRT160N). He did change his router's password, but I expect that a brief brute force attack would yield it. Or I could just sniff his network for long enough and watch him login to his own router. Or process of elimination would tell me WHICH neighbor this is, and a little social engineering would give me the router password or a short list of possibles. Once I'm in his router, I can burn my own firmware and do whatever I want, including giving myself a back door in should he ever be so silly as to attempt a "factory reset" on the router. Once its my firmware in his router, all bets are off. Reset is no longer a viable option.

I'm not evil and I'm not bored. His bandwidth is a dribbling clogged faucet compared with my pipe. Nothing motivates me to want to ruin his router or play with his network. But the fact that doing so would be so ridiculously simple is enough of a warning. There are so many things wrong with this. It all starts with broadcasting a SSID of "linksys", thus advertising yourself as not being very security savvy.

So much he could do to fix this:
Change the SSID.
Enable WPA+AES.
Force https login to the router.
Disable wireless login to the router.
Change the router's static IP from default.