Has my network been hacked?

Status
Not open for further replies.

jpres

Distinguished
Jan 26, 2012
6
0
18,510
Hello everyone. I was looking for some advice. I am wondering if someone has used an LG Nexus 4 to hack my home network. I have a Netgear Router and wireless range extender setup in my home, both enabled with WPA2 security. If I check the list of connected devices, nothing seems out of the ordinary. However, if I open the file explorer on my desktop and click on the "network" link, I see an unrecognized device. Under phones, there is a device called "occam". If I view the properties, it is a LG Nexus 4, and shows a MAC address that doesn't match anything on my Router & extender's list of connected devices. It does not have anything listed under IP address, serial number, or unique properties. The device does not always appear under my network devices, it appears intermittently. I have never owned a Nexus 4 nor does anyone who would have access to my network.

I did some brief research and apparently there are apps for the Nexus 4 that can be used to attack networks. So my questions are, is someone hacking (or at least trying to) my home network; and what can i do to stop them? Thanks in advance!
 

jpres

Distinguished
Jan 26, 2012
6
0
18,510
The reason I'm concerned is because that phone appears under the list of my network devices under the windows file explorer. I see my PC, my wireless printer, my media server, and then randomly under phones that device will appear. I do not see it under my router or extender's list of connected devices, however. My neighbors don't strike me as tech savvy, but you never know. Any thoughts on why that Nexus 4 would appear under my network devices in Windows? If it is a phone scanning for available networks, why would I see it listed along with my printer, computer, etc?
 
Okay your mixing things together, so let me clarify.

Windows File Explorer > Network > displays all devices on a network. So the device is 'on' the network (your router with extender), but not *IN* your network. Any device can try to 'access' the network by first 'listening' for wireless signals like a radio listens for radios stations. In this case the phone (a neighbor) has WIFI turned 'ON' so it automatically looks for WIFI instead of using cellular minutes. Your wireless and extender are broadcasting "BOBSWIFI", so the phone tries to automatically tune in BOBSWIFI, but then when the phone and wifi/extender talk, your network says "PASSWORD!" and the phone goes "Huh?" and that is it. So it doesn't get 'IN' your network.

Now if you don't want any device to 'pick up' your broadcast, you would need to turn off BROADCAST NAME option in your wireless, then MANUALLY add the wireless to your computer, iphones, etc. by putting in the name, password, etc.


Now your overconcern about Nexus being used to 'hack' networks is probably from one of the newscasts, which you missed a keypoint. They were referring to setting up 'fake' wireless 'extenders' at public hotspots. So you go to Starbucks and you open your laptop, then connect to Starrbucks (notice the extra R), that is the fake device your 'extending' through, that captures all your inputs (oh let me order my ticket online, here is the website and now to put in my Credit Card info). No one personally will ever target specifically you, and your network, you have nothing of 'value' for them.
 

jpres

Distinguished
Jan 26, 2012
6
0
18,510
Thanks for taking the time to reply Tom. I appreciate your help. I was hoping I was being paranoid, but I figured better safe than sorry. The reason I was worried about this Galaxy Nexus in particular is apparently it has the potential ability to crack wifi passwords. I'm not talking setting up a bogus hotspot for people to log into. I will post a couple of links so you can see the same thing I did. I hope this doesn't violate any TOS.

It does violate them but the links removed by Saga Lout and the substance left before closing the thread

I hope I'm being "overconcerned", as you put it. But I figured it would be better to reach out to people who know more than I do and put my fears at ease. Thanks again.
 
You glossed over that first link about a key element " If you're patient enough, you can crack the WEP key on a network by capturing data packets in monitor mode." WEP is NEVER used, and was replaced by WAP then by WAP2 a VERY LONG time ago because WEP is a old basic security (think of a key in a basic door lock) level. People were trying to protect more then that, so they developed WAP and been WAP2 for a long time, which is the basic model used by devices you purchase.

Now before you tell me as well there are hundreds of links of 'cracking WAP/WAP2' again you need to read what they all discuss "Brute Force attack". That is set a computing device to use a library of words from the dictionaty till it gets the right one. So enableing all this security and then setting the password as SECURITY or PASSWORD totally be like yeah got a car alarm, gps tracking, etc. here are the keys to the car can you hold them for me? Makes some sense? So using a pass-PHRASE with complex combination of Upper/lowercases, numbers and symbols is the best defense for any PASSWORD based system.

For example I love 80s rock and roll, so I could convert that into iL0v80sR&RfrEVR (read that as I love 80s Rock and Roll Forever). Yes it is very complex to type, but you get the idea to create your own, so someone won't just 'guess' till they 'get it right'.
 
Status
Not open for further replies.