Dear Guys, Help me.
My Airport Express has been hacked by unknown neighbor.
I do have some researches on internet (Macrumors) about how to secure my AP, but my China neighbor (I am long-term stay TW staff in China) still can break in my network.
1st, I found someone named "Mac XXX" under the SHARED section in the sidebar, so I immediately upgraded my security as follows;
A. Enable MAC address filtering, allow my Macbook ,my wife's Macbook and iPhone only.
B. Stop broadcasting signal (click closed network).
C. Upgrade password level from WPA (8-12 digits) to WPA2 (31 digits, random).
But unfortunately, after couples hours, I still found his name on my sidebar........
How can he did it so quickly????? how can I stop him forever?????
Pls help me.........Thanks for your prompt advice.
tkpmg wrote:
Pls help me a little. my wife said ....
請就事論事,不要用這種「可能會引起某些人的爭議」的形容詞~

幾個可能性的分析:
1. 其實根本是你連到他的無線網路去了!
以前據說很流行這套,故意設定同樣的SSID,吸引你連過去,然後側路一些網路資訊。
2. 請問原PO是用OSX還是windows?
如果是用windows的話,不排除你的電腦早就被裝木馬or後門了!請徹底檢查....
其實OSX也是有可能被感染惡意程式啦(如果那個人真的這麼有心)....
3. 你確定「側邊欄出現MAC xxx分享」就真的是被入侵的嗎?
會不會是你自己電腦分享出去的設定啊?沒記錯的話,Vmware的虛擬電腦,也會在分享區看到喔!

2. My AP has been hijacked by my unknown neighbor twice, that means I couldn't use my password to log in my network, therefore, I have no choice resetting my airport Express again to recover my authority. Obviously, my neighbor is really up to no good.
3. As I mentioned before, I used Mac all the time.
4. My IT colleague said hiding SSID is easy to break through, it's also quite easy to 'spoof' the MAC address of a legitimate machine on you network, and don't even mention about breaking my WPA/WPA2 password.
5. So... do I have to surrender?
Tim Kuo
tkpmg wrote:
2. My AP has been hijacked by my unknown neighbor twice, that means I couldn't use my password to log in my network, therefore, I have no choice resetting my airport Express again to recover my authority. Obviously, my neighbor is really up to no good.
3. As I mentioned before, I used Mac all the time.
4. My IT colleague said hiding SSID is easy to break through, it's also quite easy to 'spoof' the MAC address of a legitimate machine on you network, and don't even mention about breaking my WPA/WPA2 password.
對不起,因為你這邊的說詞,與你一開始的描述差很多... 所以必須請你重新確認一下~
而且既然你有輸入中文的能力,我不曉得為什麼你偏偏要用英文描述你的狀況?
是因為你假設「看的懂英文的人,才能幫助解決你的問題」嗎?
我先問幾個假設性問題...
如果這你這邊說的編號2,他在入侵你的AE之後,馬上就修改了密碼,讓你不能「log in my network」。到底你這邊的network是指無線網路還是AE後臺啊?
如果你連網路都連不上了,又何來看到「分享」?
簡單的說,以一般管道想要hack你的AE控制,至少要想辦法取得兩個密碼:無線網路密碼與AE密碼(從有線端入侵的可能性這邊先不考慮)。
你該不會這兩個密碼是一樣的吧?有蠻多人所有設定的密碼都是同一個.....
WPA系列的密碼已經很難破了,不過前提也是在「你使用的密碼字串必須夠亂」
如果你使用WPA,但是密碼仍然是用「12345678」,那仍然很容易被解出來....
鎖MAC的確是很有效的方法,雖然說修改自己網卡的MAC並不是難事,但想這樣子突破你的封鎖,前提也是要「他知道你的MAC」。
如果你真的想跟他玩到底,你就也換個MAC之後,鎖新MAC。這樣他能try出新MAC碼的機會應該是很低很低.....
AE密碼被得知,是我比較訝異的地方。假設原PO你不是用預設的密碼、且此密碼也與無線網路密碼不同的話,那這種入侵我真的還是第一次看到。或許是有啥類似BIOS萬用密碼之類的,如過真的是這樣子,那大概除了換一台AP以外無解。
------------------------
話說回來,從你這一連串的描述,因為他知道你太多細節了....
如果你每次做「upgraded my security」時,都有使用不同的密碼、且差異夠大的話....
他等於是必須要知道1.你新設的SSID(還是隱藏的) 2.你新設的無線網路密碼 3.你新設的AE後臺密碼 4.你的MAC address
而且這些東西必須在「couples hours」內取得!
所以這樣說吧!我認為那根本不是啥unknown neighbor啊!應該是你有接觸過的人!
因為如果要滿足上述快速取得資料的條件...
我判斷你電腦已經被安裝木馬或keylogger的可能性非常高!
雖然我已經詢問你是使用何作業系統,而你的回答是Mac all the time....
雖然我不知道你的MAC是跑OSX還是windows啦.....(反正都是MAC all the times)
windows那邊的我就不提,不過OSX這邊可是也有keylogger的唷!
只是如果像是原PO這麼在意安全性的話,我想被誤導安裝keylogger的可能性應該不高....
所以應該就是那位neighbor在某些情況時,能接觸到你的電腦,進而偷偷幫你安裝的吧!
-------------------
再提供一個最簡單的防護措施
「調低AE的發射功率!」
話說雖然是無線網路,但是你使用的範圍其實並不會那麼大吧?
取你平常會使用的最大範圍,盡可能的把功率調低....
這樣子可以很有效的避免被不三不四的人連接的可能性。
哪天你發現再你家窗口,有個人用筆電在偷偷摸摸的時候....
恭喜你!你找到unknown neighbor了!
