![]() |
|
|
|
You do not have permissi
Join Date: Aug 2001
Location: midwest
Posts: 39,832
|
ISP hacked- I need a good traffic monitor program
Last month our internet bill went from $80 to $200.
I can't imagine software updates would require 12 gigabytes of traffic. This month we used 10GB within the first 5 days or so. (No movies, very limited youtube, etc.) I did notice the router constantly flashing while the computer was off as well. -We changed the network password to a more difficult one(from the factory 8 digit). -I uninstalled Skype and the camera software for good measure as well. After that the router has acted more 'normal', but it got me thinking... I'd like to be able to see the pinging attempts and where they are originating from. I'd like to catch this intruder. This is a quiet elderly neighborhood so the list of suspects are limited. I did a full MS Security Essentials sweep in safe mode. Nothing was found on this computer. A virus is still a possibility though. One thing odd is that Firefox won't connect to the Verizon numerical website and instead diverts to the default search engine. Also, while on Yahoo e-mail my arrow navigation keys stop working. Any geeks know of a good traffic monitor? |
||
![]() |
|
Registered
|
Well "Wireshark" is always tried and true inspection tool. Just out of curiosity do you have any teenagers at home?
__________________
2021 Model Y 2005 Cayenne Turbo 2012 Panamera 4S 1980 911 SC 1999 996 Cab |
||
![]() |
|
You do not have permissi
Join Date: Aug 2001
Location: midwest
Posts: 39,832
|
Only several dogs and one thoroughly diabolical and extremely evil cat. Hmm...
|
||
![]() |
|
Regenerated User
|
tounces?
![]()
__________________
My uncle has a country place, that no one knows about. He said it used to be a farm, before the motor law. '72 911T 2,2S motor '76 BMW 2002 |
||
![]() |
|
The Unsettler
|
Sounds like someone was using your wifi network for torrent activity.
The Piratebay is back although there are suspicions that it's now a government run honey pot collecting IP addresses from visitors. A smart habitual torrentor is not going to use his own network and lead the feds to his doorstep. They were most likely parked in a car close to the house. Wardriving - Wikipedia, the free encyclopedia
__________________
"I want my two dollars" "Goodbye and thanks for the fish" "Proud Member and Supporter of the YWL" "Brandon Won" Last edited by stomachmonkey; 02-11-2015 at 06:53 PM.. |
||
![]() |
|
Registered
Join Date: Oct 2003
Location: Roseville, CA
Posts: 3,066
|
What is the Verizon website you're trying to get to? If anyone else can get to it but you can't thats a sign of malware
__________________
1992 968 Polar Silver 2010 Toyota Highlander SE 2006 Lexus LS430 ML |
||
![]() |
|
Burn the fire.
|
I vote your network was hijacked. Although, I can hit 10gb without using torrents easy. Netflix and Amazon Prime streaming video.
You may want to investigate any vulnerabilities in your router/access point. Maybe update firmware as well.
__________________
[x] Working | [_] Broken: 2017 Victory Octane [x] Working | [_] Broken: 2005 Ram 1500 SLT w/5.7L Hemi "Drive it like you stole it." |
||
![]() |
|
Registered
Join Date: Nov 2010
Posts: 660
|
X2 on wireshark BUT if you're not a techie it might just be gibberish to you.
How often do you turn your PC off? If you keep it off and usage is still high that's your answer. If it's on but you're not doing anything and your bill is high then it's a nicely hidden piece of malware. |
||
![]() |
|
You do not have permissi
Join Date: Aug 2001
Location: midwest
Posts: 39,832
|
I think it's fixed for now.
It's an older air card with a warm battery. I thought at first it was having trouble getting signal and constantly pinging for towers. Doesn't do that anymore. Just don't want other neighbors having the same situation so I'll spread the word. The numerical web address was something like 192.168.etc.etc. Verizon's online setup utility for the router. Worked in I.E. but F.F. didn't seem to recognize the address as valid. I'll try the Wireshark thanks. It may be well above my pay grade but worth learning a smidgen about networking. I'd like to catch the %$#@. Pelicans: Don't let this happen to you! Change your OE router simple password to a long combo string. |
||
![]() |
|
Straight shooter
|
192.168.1.1 is the LAN side to setup the router. You should be able to access this without connecting to the internet on the WAN. Set up a network passcode and also change the password to the router. If you find you're locked out, there's a physical reset button on the router to restore factory defaults.
__________________
“Of the value traps, the most widespread and pernicious is value rigidity. This is an inability to revalue what one sees because of commitment to previous values. In motorcycle maintenance, you MUST rediscover what you do as you go. Rigid values makes this impossible.” ― Robert M. Pirsig, Zen and the Art of Motorcycle Maintenance: An Inquiry Into Values |
||
![]() |
|
Registered
Join Date: Aug 2002
Location: MD
Posts: 5,733
|
Quote:
|
||
![]() |
|
The Unsettler
|
Don't waste your time.
If they hacked your WIFI the only IP address they will have is the one assigned by your network. Meaning the only trail will only lead right back to you because that's where it starts. If your router supports VPN and they hacked in and used you as a relay they are smarter than you so you won't catch them and they probably live in China anyway.
__________________
"I want my two dollars" "Goodbye and thanks for the fish" "Proud Member and Supporter of the YWL" "Brandon Won" |
||
![]() |
|
![]() |
You do not have permissi
Join Date: Aug 2001
Location: midwest
Posts: 39,832
|
The VPN angle is interesting but not quite sure how that works.
I thought an air card was just a telephone, which uses short range Bluetooth/WiFi to extend to a pc within 500 yards. 1). So someone on the other side of the world makes a connection, bypasses security, and obtains special permissions from my p.c.'s operating system. 2). And this allows them direct access to my card and ISP using a separate loop. 3). But wouldn't they need to pay their existing ISP for receiving the 10GB of traffic which they routed through my connection? Mind blow at this point. Too early in the morning I need a visual to understand it and need to research it by myself at this point. You don't have to explain how the internet works. Thanks for the advice. |
||
![]() |
|
Straight shooter
|
Consider checking your software for available updates. Adobe Flash had a publicised vulnerability recently.
There is also the option of a smart power supply to the router. Depending on need, you may want to shut it down when you're asleep.
__________________
“Of the value traps, the most widespread and pernicious is value rigidity. This is an inability to revalue what one sees because of commitment to previous values. In motorcycle maintenance, you MUST rediscover what you do as you go. Rigid values makes this impossible.” ― Robert M. Pirsig, Zen and the Art of Motorcycle Maintenance: An Inquiry Into Values |
||
![]() |
|
Registered
Join Date: Aug 2002
Location: MD
Posts: 5,733
|
Quote:
Quote:
Most likely your pc was/is compromised. Your focus should be cleaning your pc and installing solid firewall/av protection. |
||
![]() |
|
The Unsettler
|
Quote:
When I said "smarter" than you that was a mistype and unintended, I meant to say their skill set in this particular area exceeds yours. As in, just because I understand the concept of the game of golf I have no illusion that I could step on a course and play competitively against someone who plays 5 rounds a week. OK, A few ways for this to work. 1) They brute forced your WIFI networks password. They attached to that network and stole your bandwidth. They would have to be fairly close to do that. A neighbor or parked on the street likely no more than a house away. 2) They brute forced their way into the public facing side of your router. Most consumer home routers can be accessed from the outside as well as the inside. Depending on the routers capabilities they can now do all sorts of unpleasant things from setting up a VPN to obfuscate the true source of their activities to accessing your computers. So for the VPN example, if their originating IP address was X and your routers public IP address were Y and they are torrenting files the destination for the torrents appears to be Y, meaning Y hides X. Their would be log entries in your router for X while it's happening but most consumer routers do not have a large enough memory to hold more than a day's, if that, of logs. So to find X you'd need to be looking while it's happening. Some consumer routers can be set up to email you the log file which gives you more data over time. That's all well and good assuming they are routing through only one VPN. They could bounce through multiple VPN's. As far as their being charged from their ISP for the data? Most of us pay one monthly price for unlimited data. I could shove 1,000 GB's through my connection, (which I regularly do) does not cost me a dime extra.
__________________
"I want my two dollars" "Goodbye and thanks for the fish" "Proud Member and Supporter of the YWL" "Brandon Won" |
||
![]() |
|
You do not have permissi
Join Date: Aug 2001
Location: midwest
Posts: 39,832
|
Quote:
To be honest I was banging the thing against a rock outside and not understanding why morse code internet wasn't working. ![]() Quote:
This street is pretty open and I did have a couple of different empty cars parked/abandoned for a week or so in front of the house. I was suspicious at the time but that corresponded with the one neighbor's car missing. I figured they borrowed from a friend while theirs was in the shop. I should have walked around at night and take photos of unknown plates but that's paranoid thinking, right? There are also a couple of not-so-youngsters living with their folks that might have had extra time on their hands for mischief, and a tech savvy neighbor with whom I had some issues with a while ago over his agressive dog. I also have had a longstanding beef with a local scumbag(a real estate issue) who's embezzled money on the felony level and been trying to break me financially for the last decade after I called him out on it publicly, and continue to call him out to this day. A true nutcase. There have been a string of suspicious events from stolen trash to a possible garage break-in and unlocked car doors to stolen documents from court files, as a start of this iceberg. Who knows... Quote:
I sure hope to god I don't receive a visit from the big boys looking for movie downloads or worse....I've got plenty of free pron but it's all legal and I'll be needing the computers to pay my taxes. Quote:
What about the internal logs on this computer? I noticed the air card flashing while this computer was in sleep/hibernate, so I suspect they were accessing the card directly. Quote:
AT&T and Verizon were the first to share customer info without a court order. Sprint once ripped off my family big time on a shared phone plan. I should be looking into a T-Mobile air card, or just squat in coffee shops and libraries like everyone else in this town. |
|||||
![]() |
|
Straight shooter
|
If you have Comcast locally then why would you use an aircard? The $ problem goes away... unlimited data transfer with only a cap on port speed.
__________________
“Of the value traps, the most widespread and pernicious is value rigidity. This is an inability to revalue what one sees because of commitment to previous values. In motorcycle maintenance, you MUST rediscover what you do as you go. Rigid values makes this impossible.” ― Robert M. Pirsig, Zen and the Art of Motorcycle Maintenance: An Inquiry Into Values |
||
![]() |
|
![]() |
The Unsettler
|
Quote:
https://www.torproject.org/ And if they are in the far East, Russia, African continent or heck even in the good old USA good luck getting a subpoena for them to go digging.
__________________
"I want my two dollars" "Goodbye and thanks for the fish" "Proud Member and Supporter of the YWL" "Brandon Won" |
||
![]() |
|
You do not have permissi
Join Date: Aug 2001
Location: midwest
Posts: 39,832
|
Do you know if these 'supercookies' would nullify anonymizers or proxies?
Verizon, AT&T tracking their users with |
||
![]() |
|
![]() |
Thread Tools | |
Rate This Thread | |
|