can you recommend any (opensource or trusted) android apps to check who’s using your wifi? or any cmd prompt code to search on the desktop?

a small doubt: can anyone hack your computer through WiFi? If so, How to prevent that (or) How to take measures after you think you been hacked?

  • Monkey With A Shell@lemmy.socdojo.com
    link
    fedilink
    arrow-up
    3
    arrow-down
    5
    ·
    1 year ago

    WiFi is really no less secure than wired aside from being harder to keep people from having physical access, and since most home users don’t use any kind of connectivity protection on wired ports it might even be seen as more secure.

      • 𝕸𝖔𝖘𝖘@infosec.pub
        link
        fedilink
        English
        arrow-up
        2
        arrow-down
        1
        ·
        edit-2
        1 year ago

        Not necessarily. If you have an off the shelf home network, and you have a vulnerable device (smart toaster, smart light bulb, IP camera, unpatched laptop, old iPhone or Android version, unpatched router, etc.), wired or wireless doesn’t make much of a difference. Once one device on your network is compromised, the entire network is compromised. I don’t have to be near you to get that done. Shoot, I don’t even have to be in the same country to get that done. I would say, due to the proximity rule, wifi is less secure since it takes less effort, but only in terms of that one rule.

        E: added a couple more examples of common vulnerable devices.

      • Monkey With A Shell@lemmy.socdojo.com
        link
        fedilink
        arrow-up
        1
        arrow-down
        1
        ·
        1 year ago

        That’s the point of mentioning the physical access. Yes it’s easier to get at ‘physically’ in that it allows you to reach it through walls, but, if physical access WAS obtained what protections do you have in place for a lan jack? It’s possible to use 802.1x auth or such but for most home users it’s just a case of plug in a cable and you’re part of the network.

          • Monkey With A Shell@lemmy.socdojo.com
            link
            fedilink
            arrow-up
            1
            arrow-down
            1
            ·
            1 year ago

            https://shop.hak5.org/products/lan-turtle

            Assume physical access, someone walks in and has 5 minutes out of sight. A decent wpa2 password would take an extraordinary long time to brute force. Something like above gets deployed and allows remote access in seconds on an unprotected lan. As noted in another comment sketchy IOT gear is a threat people install willingly. The old test of leaving a loaded USB in the parking lot catches more people than is reasonable. Don’t assume a physical door is going to stop someone more than a proper technical barrier.