Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    This 12yrs Old Boy

    Scheduled Pinned Locked Moved Off-Topic & Non-Support Discussion
    12 Posts 4 Posters 1.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • R
      rcoleman-netgate Netgate @NollipfSense
      last edited by

      @nollipfsense you meant the stock image on your screen cap? I wouldn't read into that one iota.

      Ryan
      Repeat, after me: MESH IS THE DEVIL! MESH IS THE DEVIL!
      Requesting firmware for your Netgate device? https://go.netgate.com
      Switching: Mikrotik, Netgear, Extreme
      Wireless: Aruba, Ubiquiti

      NollipfSenseN 1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator @NollipfSense
        last edited by

        @nollipfsense said in This 12yrs Old Boy:

        Sure, I don't broadcast SSID

        That has zero to do with anything.. That hides your wifi from the 84 year old grandma across the street..

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        NollipfSenseN 1 Reply Last reply Reply Quote 0
        • NollipfSenseN
          NollipfSense @rcoleman-netgate
          last edited by

          @rcoleman-netgate I took a screen shot of the video ad on Twitter and of course it's hyped up to get clicks and seems to be promoting Cisco devices.

          pfSense+ 23.09 Lenovo Thinkcentre M93P SFF Quadcore i7 dual Raid-ZFS 128GB-SSD 32GB-RAM PCI-Intel i350-t4 NIC, -Intel QAT 8950.
          pfSense+ 23.09 VM-Proxmox, Dell Precision Xeon-W2155 Nvme 500GB-ZFS 128GB-RAM PCIe-Intel i350-t4, Intel QAT-8950, P-cloud.

          1 Reply Last reply Reply Quote 0
          • NollipfSenseN
            NollipfSense @johnpoz
            last edited by

            @johnpoz It in response to the kids statement that he doesn't join a WIFI he doesn't know but yes I know there are tools to discover hidden WIFI SSID.

            pfSense+ 23.09 Lenovo Thinkcentre M93P SFF Quadcore i7 dual Raid-ZFS 128GB-SSD 32GB-RAM PCI-Intel i350-t4 NIC, -Intel QAT 8950.
            pfSense+ 23.09 VM-Proxmox, Dell Precision Xeon-W2155 Nvme 500GB-ZFS 128GB-RAM PCIe-Intel i350-t4, Intel QAT-8950, P-cloud.

            johnpozJ 1 Reply Last reply Reply Quote 0
            • johnpozJ
              johnpoz LAYER 8 Global Moderator @NollipfSense
              last edited by

              @nollipfsense said in This 12yrs Old Boy:

              the kids statement that he doesn't join a WIFI he doesn't know

              huh?? What does that have to do with anything? So he doesn't join the wifi network at starbucks - what does that with you not broadcasting a SSID?

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.8, 24.11

              NollipfSenseN 1 Reply Last reply Reply Quote 0
              • NollipfSenseN
                NollipfSense @johnpoz
                last edited by

                @johnpoz Nothing as I by practice don't broadcast SSID regardless. However, yes I know it's an ad with hype, yet still curious as how he could reveal the password if true. He mentioned poison, not sure if that's a tool as in the video demo, he revealed the interviewer's Twitter login password. Any insight of possible methodology you could share?

                pfSense+ 23.09 Lenovo Thinkcentre M93P SFF Quadcore i7 dual Raid-ZFS 128GB-SSD 32GB-RAM PCI-Intel i350-t4 NIC, -Intel QAT 8950.
                pfSense+ 23.09 VM-Proxmox, Dell Precision Xeon-W2155 Nvme 500GB-ZFS 128GB-RAM PCIe-Intel i350-t4, Intel QAT-8950, P-cloud.

                johnpozJ 1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator @NollipfSense
                  last edited by johnpoz

                  @nollipfsense said in This 12yrs Old Boy:

                  by practice don't broadcast SSID regardless

                  Which is completely utterly a waste of time, and back in the day listed in the top 6 dumbest ways to "secure" a wifi.. Broadcasting your ssid in no way shape or form ads any sort of security.. But what it does do it make it harder for you to join your own network. Depending it could be even making your network more known, because devices always broadcasting for it..

                  https://www.zdnet.com/home-and-office/networking/the-six-dumbest-ways-to-secure-a-wireless-lan/

                  "SSID hiding: There is no such thing as "SSID hiding". You're only hiding SSID beaconing on the Access Point. There are 4 other mechanisms that also broadcast the SSID over the 2.4 or 5 GHz spectrum. The 4 mechanisms are; probe requests, probe responses, association requests, and re-association requests. Essentially, youre talking about hiding 1 of 5 SSID broadcast mechanisms. Nothing is hidden and all youve achieved is cause problems for Wi-Fi roaming when a client jumps from AP to AP. Hidden SSIDs also makes wireless LANs less user friendly. "

                  That 12 year old kid news nonsense was from what 2018? Your just now finding it.. Its a simple poison attack.. Im on the same wifi network as you - I tell you via an arp poison/spoof - hey I am the AP, or I am your destination or gateway.. send traffic to me to get to where your going, Look I can ask you for passwords, or I could do a mitm on where your trying to go, all kinds of things.. This is nothing new, this isn't some crazy new exploit to wifi or really any network..

                  A normal good wifi network would be isolated so clients can not even talk to each other, or send arp traffic, etc. So some other client on the same wifi network as you, wouldn't be able to talk to you.. This is L2 isolation..

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                  NollipfSenseN 1 Reply Last reply Reply Quote 1
                  • M
                    mcdvoiceo1
                    last edited by

                    mostly they are copying pros bugs and doing nothing new, sooner or later it will be fixed for sure

                    johnpozJ 1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator @mcdvoiceo1
                      last edited by

                      @mcdvoiceo1 said in This 12yrs Old Boy:

                      sooner or later it will be fixed for sure

                      what will they fix, arp spoofing? How are they going to do that - the are already protections against it. static arp, or just plain L2 isolation for devices that shouldn't be talking to each other - like in the case of some public hotspot wifi network.. Your say a hotel in room 32 - in what scenario would you need to be able to see traffic to from room 46? On a switch I can do port security so a specific mac can only be on a specific port, etc.. So bad guy can not plug in and say he is the same mac..

                      So you have in your arp cache the mac aa:bb:cc:00::00:01 for IP 192.168.1.1 your gateway..

                      Now that expires, and you arp hey 192.168.1.1 what is your mac, and some bad device answers hey the mac for 192.168.1.1 is aa:bb:cc:00:00:42

                      How is the client going to know that is not legit? And now he starts sending all traffic meant for the gateway to the bad guy..

                      None of that stuff that kid was doing back in 2018 was new, or really any sort of new exploit or scare -- what made it slow news day news is he was 12.. And users are completely and utterly clueless to how any of their magic boxes work or talk to each other - so sure scare them and throw out some terms they have no clue to what they mean.. Its like watching star trek and they make up technobabble terms.. Can hack any of your password? Click bait scare tactics for the sheeple.

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      1 Reply Last reply Reply Quote 0
                      • NollipfSenseN
                        NollipfSense @johnpoz
                        last edited by NollipfSense

                        @johnpoz said in This 12yrs Old Boy:

                        That 12 year old kid news nonsense was from what 2018? Your just now finding it.

                        As I stated in the first post, it's an ad currently running on Twitter and no, I didn't hear of it back in 2018. Here's the ad link:

                        https://twitter.com/CNET/status/1582763509623836673

                        pfSense+ 23.09 Lenovo Thinkcentre M93P SFF Quadcore i7 dual Raid-ZFS 128GB-SSD 32GB-RAM PCI-Intel i350-t4 NIC, -Intel QAT 8950.
                        pfSense+ 23.09 VM-Proxmox, Dell Precision Xeon-W2155 Nvme 500GB-ZFS 128GB-RAM PCIe-Intel i350-t4, Intel QAT-8950, P-cloud.

                        R 1 Reply Last reply Reply Quote 0
                        • R
                          rcoleman-netgate Netgate @NollipfSense
                          last edited by rcoleman-netgate

                          @nollipfsense said in This 12yrs Old Boy:

                          https://twitter.com/CNET/status/1582763509623836673

                          I watched 22 seconds of this.
                          it's not a hack of the your WAP password.

                          It's decrypting the traffic after getting in. Which is usually due to poor SSID deployment, using weak passwords, etc.

                          I was asked last year (and still haven't completed) by a higher up here at Netgate to write a blog post about securing your home WiFi and why firmware updates are important for all devices... I should get back to that.

                          The issue here is manufacturers are building sub-par, poorly secured devices and selling them to consumers as a solution. Weak encryption is just that – weak.

                          I've been doing WiFi design for more than a decade and these are the things I design against.

                          Ryan
                          Repeat, after me: MESH IS THE DEVIL! MESH IS THE DEVIL!
                          Requesting firmware for your Netgate device? https://go.netgate.com
                          Switching: Mikrotik, Netgear, Extreme
                          Wireless: Aruba, Ubiquiti

                          1 Reply Last reply Reply Quote 2
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.