Wardriving 101

No explicit questions like "how do I hack xxx.com" please!
Post Reply
User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

Wardriving 101

Post by DNR »

ok, someone said they got a laptop with a wifi card - what next?

Ok, go and find a AP to connect to. This can be at a business, for customers or not, at a home, apartment, condo, etc.

Right now go and find a personal wifi AP, since we want to play around with the web interface - and business and corporate networks usually are smart enough to change defaults. We are counting on the home-owner with no clue on security, and set everything so all his computers will be PnP.

You cannot access the web interface for the wifi AP unless you are attached to its network. If you try entering http://192.168.1.1/ now, you will feel like a lamer.
NetRange: 192.168.0.0 - 192.168.255.255
NetType: IANA Special Use
NameServer: BLACKHOLE-1.IANA.ORG
NameServer: BLACKHOLE-2.IANA.ORG
Ok, say you drove around (or looked pretty stupid walking around) and ended up in a condo complex. Netstumbler will tell you who is there, but it will not connect you to those networks. Look for the ones with no security, no WEP or WPA, or no padlock symbols in netstumbler. The SSID will not matter right now, they can have the device name 'linksys' or even the home owner's name! "Tomlison", etc.
You want to find one with a good usable signal strength. Remember, there are TWO signals Transmit and Recieve. Your laptop's shitty wifi card probably has decent Recieve parameters, but you'll need to be close to an AP to have good, reliable Transmit because your laptop card is weak powered. So just because you can detect a wifi signal, it doesn't mean you can connect to it - too far away to Transmit to it. You can use a Hi-gain antenna to increase both Transmit and Recieve ranges.

There are other signals in the wifi frequency that are not AP. You can connect to printers, but not usually other computers (peer-to-peer) unless both are configured and a Host-Based Firewall will block unrequested traffic, just like it was on a cabled network.

Now, you find a AP, you open up the Windows "wireless connection manager" you will have it search for wireless networks , and it will display the networks you saw in Netstumbler. Pick one and connect.

It will take a few looong seconds, maybe a minute - its doing the standard handshake "Hey I want to connect" "sure, I got no security whatso ever!" "Thanks!" If it takes longer - you are likely too far away to transmit reliable packets to the AP - if you ran a packet sniffer on yourself you would see dropped packets and resends. Select another AP if so.

Once you Connect, you should be able to access the internet! Just open a browser and select www.suck-o.com! If you see the site, you are sucessfully on a unsecured wifi AP.
If you went to shieldsup or some site that will scan your computer - you will have the IP/isp of the homeowner who owns the AP. Everything you do online will be traced at first to the poor homeowner because he is registered to the ISP! Sucka!

Now, lets find the default web interface page for the AP!
You need to enter http:// and the default IP of the router, here are examples with default logins:

ROUTER SSID WEBINTERFACE IP USERNAME PASSWORD

3Com Office Connect 3CRWE754G72-A 3Com http://192.168.1.1/ <blank> <blank>
Belkin F5D7630-4A belkin54g http://192.168.2.1/ <blank> <blank>
BT Voyager 2000 BTVOYAGER http://192.168.1.1/
http://voyager.home/ admin admin
BT Voyager 2100 BTVOYAGER2100 http://192.168.1.1/
http://voyager.home/
BT Wireless Network 1250 <blank> http://192.168.0.1/
http://gateway.2wire.net/ <blank> <blank>
Buffalo AirStation 54Mbps http://192.168.11.1/ root <blank>
D-Link DSL-604+ default http://192.168.0.1/ admin admin
Intertex IX66 AirSIP wireless_gw http://192.168.30.1/
Netgear DG814 http://192.168.0.1/ admin password
Netgear DG824M Wireless http://192.168.0.1/ admin password
Netgear DG834G NETGEAR http://192.168.0.1/
Linksys WAG-54G linksys http://192.168.1.1/ admin admin
SMC ADSL Barricade 7404WBRA hub
Solwise SAR-110 http://192.168.7.1/ DSL DSL
Solwise SAR-715PVW act1 http://192.168.1.1/ admin admin
U.S. Robotics SureConnect 9106 USR9106 http://192.168.1.1/ admin admin
Vigor 2600 http://192.168.1.1/ admin <blank>
Westell WireSpeed 2410 Wireless LAN http://192.168.1.1/ <blank> <blank>

ok, you need to have the correct IP for the router, if the SSID had the name of the router 'linksys' or 'belkin' it narrows it down! otherwise just try the default IPs, there are only so many, and they are all 192.168.xx.xx

When you login to the proper IP, you will see the welcome screen for Admin! IF you are prompted for user and password, try the above defaults. You can search manufacture's websites for technical manuals - they will tell you the defaults there.
If it is not the default user/pass - try the SSID, some people seem to think the SSID is the user/pass, try the SSID as user, with no pass. You can also try the home address, the person's name (use address look up via whitepages.com)

At the web interface for the AP you want to do a couple of things qiuick, first - see if anyone else is online!

Attached Devices

PCs and Devices currently on the Network
# Device Name IP Address MAC Address
1 192.168.0.4 DNR-8365FF2 00:90:4b:f1:f9:75

Only me! This would tell you about other computers you might connect to, as in open Shares.

You want to view and disable the Logs - because the transaction of you logging into the AP is in there as well as any sites you'll visit.

You also want to disable "send Email" - this will disble email notifications to someone regarding access to the web interface or other events:

Known DoS attacks and Port Scans
Attempted access to blocked sites
All Websites and news groups visited
All Incoming TCP/UDP/ICMP traffic
All Outgoing TCP/UDP/ICMP traffic
Other IP traffic
Router operation (start up, get time, administrator login, logout info etc.)
Connections to the Web-based interface of this Router
Other connections and traffic to this Router

You can reset the admin password, so they can't get in and lock you out!
All they would have to do is use a paper-clip to hit a 'reset' button on the router itself - so they could get back in - BUT they'll erase the logs on the router itself!

This is an example of unauthorized access to a computer or network, and thus a violation of the US Federal Laws regarding computers and networks.

DNR
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

User avatar
lilrofl
Siliconoclast
Siliconoclast
Posts: 1363
Joined: 28 Jan 2009, 17:00
15
Location: California, USA
Contact:

Thourough

Post by lilrofl »

Awesome read!

Thanks for the knowledge drop =)

User avatar
Kirk
suck-o enforcer
suck-o enforcer
Posts: 547
Joined: 25 Apr 2009, 16:00
14
Contact:

Post by Kirk »

Once again, extremely well written. Even someone with my limited knowledge can understand it perfectly. I'm going to try it on my brother-in-laws network as soon as I can get a laptop (some day).

Post Reply