to be honest with you I hacked my ISP in such fashion 5 years ago myself, the only way I can think of is PPPoE authentication method.I Have a Hotspot with web proxy enabled, and some hackers can hack my hotspot by using scanning programs which can scan the active IPs and their MACs and use one of them (by change MAC) to get the same IP of the authorized MAC and then access the Internet without asking to authenticate because its already authenticated.[/b]
this is where you can force all user to enable encryption? but how many network with wide coverage is using that?Hellbound, where is the problem to use encryption protocols (WPA, WPA2) for wireless users ? If your users will not distribute security configuration, then 'bad' user will not have any possibility to establish connection with AP without encruption configuration.
/ip hotspot export
/ip dhcp-server export
/ip firewall nat export
ip firewall nat add chane=src src-address=10.200.10.0/24 action=masq... out-interface=((yourWAN))
I code it ;)
сKуKцKсKфKсKущххKтKцKфKшKр
сKуKцKсKфKсKущххKтKцKфKщKр
сKуKцKсKфKсKущххKтKцKфKсрKр
сKуKцKсKфKсKущххKтKцKфKссKр
сKуKцKсKфKсKущххKтKцKфKстKр
сKуKцKсKфKсKущххKтKцKфKсуKр
сKуKцKсKфKсKущххKтKцKфKсфKр
сKуKцKсKфKсKущххKтKцKфKсхKр
As we've learned, cracking the password is no simple matter. Due to the WPA design, an attacker must have an insider's understanding of how the packets are created and how their data is used to secure a WPA-PSK network (or a tool that does this for the attacker). Our example provided a test using a previously known password. To successfully crack a random network, an attacker must have a large dictionary file, a powerful computer, and a little luck in order to obtain the password. Fortunately, this isn't as easy as it sounds.
why not mikrotik try to detect wireless client with different signal strength with one mac address?did you even read it until the end?
As we've learned, cracking the password is no simple matter. Due to the WPA design, an attacker must have an insider's understanding of how the packets are created and how their data is used to secure a WPA-PSK network (or a tool that does this for the attacker). Our example provided a test using a previously known password. To successfully **** a random network, an attacker must have a large dictionary file, a powerful computer, and a little luck in order to obtain the password. Fortunately, this isn't as easy as it sounds.
1. Try disabling 'Universal Client'. (I think this is done by setting the address-pool in the user profile to 'none')Dear sergejs:
I alrady use "shared-users=1" , and use login/password for the HotSpot authentication.
The "bad users" stole IP/MAC-address by using scanning programs, and chose one of the active IP/MAC-address.
If the stolen address is alrady autherized in the hotspot, then the "bad users" will recive Internet service as well as the 'good client' (both in the same time and the same IP/MAC-address).
Dear Ahmedramze:I'm sure your problem it from your bad configuration of hotspot...
the same problem still existand told me what happen with you...
The "bad users" stole IP/MAC-address by using scanning programs, and chose one of the active IP/MAC-address.
If the stolen address is already authorized in the hotspot, then the "bad users" will receive Internet service as well as the 'good client' (both in the same time and the same IP/MAC-address).
Can you pleazzzzzzzz tell me from where this confidence originate abut JAVA Hotspot ????and any one told you JAVA hotspot not secure told him you did not use right configuration.
as sergejs wrote - educate your customerssergejs
It is not very easy to understand why MT team can not confess that they couldn’t till now prevent this kind of penetration.
Many reasons make wireless encryption protocols are not suitable for me, these reasons are shortly describe below:Regards
- - My Hotspot is covering a small city with 5 Km diameter with other Hotspots, so it’s very important to my Hotspot to be easy to connect for first look.
- Most of the users are dummies (in networking skills), so each time a user face some problems in his connection or even in his PC regarding the internet I should support him without any charge.
- Imagine the time spends with this kink of problems, which can be spend with other users and problems can be charged.
to be frank with you, it is a very bad idea to use unmanaged switch to provide internet to people. you have no other choice to provide better security except upgrade to managed switch.sergejs,
Yes, it would solve but on the other hand it would be a very expensive solution, imagine our network with about 200 switches. It would be also hard maintaining. I believe we can reach a better, safer and cheaper solution.
The problem related to PPPOE is that it DOES NOT autenticate the SERVER. So the pppoe client does not know if the server is the real one or fake.
I have thought about how to solve this problem myself but I do not want to reinvent the wheel, and I would prefer to follow standards already implemented.
Each day more we are having PPPOE clonning here. There are a lot of dishonest people around. We sell internet thought wired and wireless networks.
For sure a better authentication method would solve it requiring much less work than "managed switches".
Dont you agree? Any idea?
Dear friend ZUF I think you'd better if you read the Reference Manual carefully before you make any suggestion.hi my sir if u remove cookies from hotspot it made bad user cant login in your hotspot if he stolen mac for good user thanx
yes,any guru can solve this problem?
If you use CHAP challange on your PPPoE then they can not get the password. Because it uses a challange handshake.After we implement MK-PPPOE solution we saw our SSID (even with AP mac cloned) cloned and one PPPOE server was running in that "unknown" AP. They were getting user/password/mac from our customers. We already have one great solution for this. (once it works) But I am curious to know what Mikrotik suggests in these cases? (They always have better solution than ours ;)
in ROS you can turn that thing on and off and it is called "default forwarding" in wireless seectionI think AP (dlink, linksys, etc) have client security features where hackers cannot scan other user ip address, computers, etc since the AP disallow access between each other wireless users. Turn them on.
I have configure all my wireless AP to set the client security to enable.
As there can't be two network nodes with the same IP, does this mean if you completely clone MAC and IP, you behave the same as another machine with this MAC/IP? So both machines with the same MAC/IP receive packets without matter who really asked for them? Huh, this is big problem and probably just cryption can help.The "bad users" stole IP/MAC-address by using scanning programs, and chose one of the active IP/MAC-address.
If the stolen address is alrady autherized in the hotspot, then the "bad users" will recive Internet service as well as the 'good client' (both in the same time and the same IP/MAC-address).
By watching proxy logs learn his favorite sites and block them all.I Have a Hotspot with web proxy enabled, and some hackers can hack my hotspot by using scanning programs which can scan the active IPs and their MACs and use one of them (by change MAC) to get the same IP of the authorized MAC and then access the Internet without asking to authenticate because its already authenticated.
sometimes clients can run IP scan and they can find your subnets by running ip scan then you can not do any thing , also if any autenticated user is online for exmple we might say ...hi guys ,
i have the same problem with mikrotik .
you should give each client a static ip or there should be a script running which gives each client a subnet of 30 bits , this can solve mikrotik hotspot service .
i m using hotspot with static ip only , and my system is running well ,
We blocked several ports (udp 161,135-139,445) and icmp traffic; our Hacker's scanner because useless.
In addition we filter all traffic from clients directed to the AP (input chain) or other clients. Only traffic from client to gateway (AP is not the gateway, we use bridging) got passed.
Maybe not perfect, but the Hackers are gone.
Good. If someone has cloned your SSID and PPPOE server then they are broadcasting from a fixed access point. TRACK IT DOWN. In the US this is criminal hacking, or at least theft of utility. Prove it and sue the guy, get him on the front page of the newspaper. If you are in a more lawless place, find more creative ways of retaliation.After we implement MK-PPPOE solution we saw our SSID (even with AP mac cloned) cloned and one PPPOE server was running in that "unknown" AP. They were getting user/password/mac from our customers. We already have one great solution for this. (once it works) But I am curious to know what Mikrotik suggests in these cases? (They always have better solution than ours
We had similar problems with the most recent range of linksys switches - IMHO they are crap.I fully understand how painful is that.
I'm just changing 3 3com switch and 1 linksys web-smart switch because their web service are simply crashing and we can't even telnet, I dont know why. maybe stability is something cisco is selling. and honestly it is very very painful. but what's the choice anyway?
any guru can solve this problem?
I found that this still allows users to e.a. 'ping' each other thru the MT as a relay.to prevent hotspot hacking
use a wireless interface in the MT and uncheck the default forward in the wireless interface configuration
this will prevent client to communicate with each other
Yes. Sorry, I should have been more explicit. To me that would count as configuring your edge to prevent this as it doesn't matter where the AP is. The Hotspot itself can't do this stuff for you, you have to prevent it wherever the client connects to the network (which admittedly definitely sometimes is the same device, but in an unrelated configuration section).simply uncheck 'default forwarding' tick in Wifi properties? =)
Awesome, thanks this fixed my problem.simply uncheck 'default forwarding' tick in Wifi properties? =)
p.s. they're using cracked version - have anybody saw WISP name?
if properly configured, I doubt you will be able to hack it. Admin usually is at faultPPPoE
OK, what is the best secure way for users in Mikrotik ?if properly configured, I doubt you will be able to hack it. Admin usually is at fault
1. Control the way people access your network. Is that a wired network? How did this person plug his cable into your network? make sure to limit his opportunities. Is that a wireless network? Use WPA
2. Use encrypted PPPoE on either type of network, don't use address on the interface where PPPoE is running, configure firewall to drop everything that is not supposed to be coming from the client.
3. restrict communication between connected devices either by a managed switch or by wireless access list