Is it possible to log people trying to access the network??

Discussion in 'Tomato Firmware' started by Potty, Oct 3, 2008.

  1. Potty

    Potty LI Guru Member

    Just wanna know if it's possible to log that. The little neighbor boy likes to pretend he's a hacker sometimes and I'd like to be able to check and see that he's (or anyone else for that matter) not trying to break into my network (I have to keep it at WEP due to certain things not supporting WPA).
  2. Slavedriver

    Slavedriver LI Guru Member

    Yeah, such feature would be awesome because I almost returned a laptop when I forgot that I had wireless filter enabled and logs didn't show a thing. Thought it had a broken WiFi or something :)
  3. Clovenhoof

    Clovenhoof Addicted to LI Member

    You should consider to change the encryption method at least to WPA, because WEP can be easily hacked, even without real hacking-skills.

    As for your wireless network, with a long enough WPA/WPA2 key you won't have to worry for being hacked, but the security of your operating system is a different question.
  4. Potty

    Potty LI Guru Member

    Yeah, I can't use WPA because one of my devices only supports WEP. I take it the answer to my question is a no.
  5. Clovenhoof

    Clovenhoof Addicted to LI Member

    Well, WEP can be hacked unless the process being detected, so I'm afraid, in this case the answer is: no.
  6. Potty

    Potty LI Guru Member

    Well perhaps that would be a good little thing to add to the next version!
  7. likuidkewl

    likuidkewl Network Guru Member

    I know this doesn't actually answer your question, but you can enable the MAC filter to allow only. Then WEP is on the "ok"-side. But still if he reads about ARP poisoning........
    I _think_ you should be able to see a connection attempt(in a round about way) when grep-ping through the logs on the router.
  8. HennieM

    HennieM Network Guru Member

  9. kevanj

    kevanj LI Guru Member


    you could mention it to 'little neighbor boy's' parents, and remind them that what the boy is doing is a felony....
  10. LLigetfa

    LLigetfa LI Guru Member

    I asked Victek to look at the Buffalo source since Buffalo has logging but I haven't heard further from him. I have a dozen APs on my hotspot that I would love to run Tomato with Victek mod on it if only it logged WL associations.
  11. bhlonewolf

    bhlonewolf LI Guru Member

    (not exactly in line with the OP's question) but, no, even with MAC filtering, that doesn't help much. I could (in theory, as a hacker) sit outside your house, capture all your data, and potentially break the WEP key.

    If you have a device that's WEP only, honestly, I'd set up a separate network just for it, to isolate it from the rest. Or dump the device for a new version that supports something better.
  12. likuidkewl

    likuidkewl Network Guru Member

    Right, the only way to "sniff" the WEP key is to sniff the wireless traffic and get the MAC(s) off each packet. Then being able to piece out the key is easy. Hence the "OK" rating and mention of ARP poisoning. ;)

    A determined(read bored) teen will more than likely try this out.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice