Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: JRandomFreeper

I thought there were logs to trace all that stuff.

I’ve always wondered about how that works, tho, given that non-static IP addresses get recycled every 8 hours or so. That’s gotta make it way more difficult to track it down.


33 posted on 05/29/2010 7:51:37 PM PDT by webstersII
[ Post Reply | Private Reply | To 3 | View Replies ]


To: webstersII
Sure, traffic can be traced to a non-static ip that changes regularly, but is often tracked by Radius software for billing purposes, or, more likely, because the admin is lazy and wants the Radius box to do NAT, instead of buying a real router. Get the address from billing and kick down the door.

But that just gets you to a CPE (Customer Premises Equipment). Which may or may not be a wireless router, and if it is, may or may not be secured.

Do a war drive and look for 'linksys' as wireless router names. There are LOTS of unsecured wireless routers out there.

Stand everything on it's head and be a bad guy. You want to get X off of the internet, and you don't want it tracked back to you.

Get a laptop without a Broadcom wifi card. Tinker with the MAC on the card to make it not yours. Software only, so if checked after turning it off, it shows up as your normal MAC.

Then, go trolling for 5 or 10 unsecured wireless networks nearby. When you find them, write a script to share them in the time domain.

You have to make sure you don't drop state for the protocol and application, but it's very doable.

The only people that get cold busted are the idiots, or the truly malevolent that require megabucks to track. Everybody in between, not so much.

/johnny

36 posted on 05/29/2010 8:10:29 PM PDT by JRandomFreeper (Gone Galt)
[ Post Reply | Private Reply | To 33 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson