Page 1 of 3 123 LastLast
Results 1 to 10 of 23

Thread: stealing wifi.......

  1. #1
    Developer
    Join Date
    Mar 2007
    Posts
    6,126

    Default stealing wifi.......

    I came across this article today. I thought Id post it so we can address the legal aspect of using unsecured wifi before all kinds of pointless threads show up here. The point
    Is if your not paying and its not a advertised FREE hotspot you probably shouldnt be stealing anyones wifi.

  2. #2
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Quote Originally Posted by purehate View Post
    I came across this article today. I thought Id post it so we can address the legal aspect of using unsecured wifi before all kinds of pointless threads show up here. The point
    Is if your not paying and its not a advertised FREE hotspot you probably shouldnt be stealing anyones wifi.
    From a link on that page...
    NEW YORK (CNN/Money) - Police have charged a Florida man with a third-degree felony charge, after he was arrested for accessing a St. Petersburg resident's wireless Internet network without permission.

    It says its a greay area mainly because wifi security laws are new and non specefic....but Im telling you now..If you steal my bandwith...my beer or my wife...theres gonna be trouble...especially about the beer.

    Deja Vu purehate??..lol
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  3. #3
    Developer
    Join Date
    Mar 2007
    Posts
    6,126

    Default

    nothing like drinking a few wives and swapping beers among friends, now stealing my bandwidth could land you in some trouble with the law of me......

    the fact of the matter is "the net" is not that expensive. A 14 year old could open a lemonade stand and make enough to pay monthly for broadband. hey wait a min....... Ive got a kid I can put to work

    man in the middle attacks at starbucks

  4. #4
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Quote Originally Posted by purehate View Post
    Ummm..pureunhelpful.....that links broken.

    Great..now it works..you post -post editor!! lol
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  5. #5
    Just burned his ISO
    Join Date
    Jun 2007
    Posts
    3

    Default

    Quote Originally Posted by Xploitz View Post
    Ummm..pureunhelpful.....that links broken.

    Great..now it works..you post -post editor!! lol
    Link works fine for me! First time i got some message telling me the server was down or (more likely?) overloaded. So.. who is the man behind this DoS attack?

    Shaggy - Wasn't me

  6. #6
    Junior Member
    Join Date
    Feb 2006
    Posts
    25

    Default

    Starbucks man in the middle article:

    It seems it is based on this forum:
    http://forums.remote-exploit.org/sho...nstx+tunneling

    not a chat room as the article references. The user names he quotes are all members here. I thought it was funny cause while reading the article, it made me remember, hey, i posted a few things in that thread....

    tparnet

  7. #7
    Member
    Join Date
    Jan 2007
    Posts
    242

    Default

    Wow, itseme is famous. :-)

    "From the language used, the criminals appear to be US-based"
    It's them damn seppos, again. (I'm american, btw. Guess that makes me a seppo, too)

    If articles like this don't put the heat on this forum, I don't know what will. Everyone needs to watch what they say, the men in black are watching.

    Seriously, this is a real good reason to limit discussions here to legal topics.

    On the other hand, it's open discloser and articles like this one that make average people aware of the various insecurities and danger of wireless usage and the internet in general. The more attacks like mitm are talked about, the more people will understand and take appropriate measures. I believe security info should be free and freely discussed. I guess it's important how it's discussed, though.

    Even with all the recent publicity about wireless insecurities, I think your average user is still blissfully unaware. :-(

  8. #8
    Senior Member streaker69's Avatar
    Join Date
    Jan 2010
    Location
    Virginville, BlueBall, Bird In Hand, Intercourse, Paradise, PA
    Posts
    3,535

    Default

    Quote Originally Posted by ghaze View Post

    Even with all the recent publicity about wireless insecurities, I think your average user is still blissfully unaware. :-(
    I think you're mistaken in that aspect, as I have seen personally a growing number of average users enabling security on their AP's. Over on Wigle, for the first time since it started, I believe the number of open AP's to closed AP's is almost even at 50% each. In my own area, (I've collected nearly 18,000 AP's), I've seen the ratio of open to close go from about 6 to 1 to now about 3 to 1. Word is getting out there even among the average users.
    A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.

  9. #9
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Quote Originally Posted by tparnet View Post
    Starbucks man in the middle article:

    It seems it is based on this forum:
    http://forums.remote-exploit.org/sho...nstx+tunneling

    not a chat room as the article references. The user names he quotes are all members here. I thought it was funny cause while reading the article, it made me remember, hey, i posted a few things in that thread....

    tparnet
    Just goes to show you...they ARE watching..and we need to cover our asses by not teaching morons how to hack and use -=Xploitz=-..etc. But how can we make sure info isn't leaked to a criminal minded person?? You can't..but you can chose not to tell someone the answer to what their seeking.

    Great..now were all targets of the FBI..CIA.MIB..Big Brother....AND theprez98

    Fu*king n00bies are drawing heat on us!
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  10. #10
    Member
    Join Date
    Jan 2007
    Posts
    242

    Default

    Streaker69,

    I have also noticed that more access points seem to be secured, not just with wep, but more and more with wpa.

    I was referring to the average user who would access the internet through any of the free, public wifi hotspots, not people who have their own networks.

Page 1 of 3 123 LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •