can you recommend any (opensource or trusted) android apps to check who’s using your wifi? or any cmd prompt code to search on the desktop?

a small doubt: can anyone hack your computer through WiFi? If so, How to prevent that (or) How to take measures after you think you been hacked?

    • 𝕸𝖔𝖘𝖘@infosec.pub
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      1
      ·
      edit-2
      1 year ago

      Not necessarily. If you have an off the shelf home network, and you have a vulnerable device (smart toaster, smart light bulb, IP camera, unpatched laptop, old iPhone or Android version, unpatched router, etc.), wired or wireless doesn’t make much of a difference. Once one device on your network is compromised, the entire network is compromised. I don’t have to be near you to get that done. Shoot, I don’t even have to be in the same country to get that done. I would say, due to the proximity rule, wifi is less secure since it takes less effort, but only in terms of that one rule.

      E: added a couple more examples of common vulnerable devices.

    • Monkey With A Shell@lemmy.socdojo.com
      link
      fedilink
      arrow-up
      1
      arrow-down
      1
      ·
      1 year ago

      That’s the point of mentioning the physical access. Yes it’s easier to get at ‘physically’ in that it allows you to reach it through walls, but, if physical access WAS obtained what protections do you have in place for a lan jack? It’s possible to use 802.1x auth or such but for most home users it’s just a case of plug in a cable and you’re part of the network.

        • Monkey With A Shell@lemmy.socdojo.com
          link
          fedilink
          arrow-up
          1
          arrow-down
          1
          ·
          1 year ago

          https://shop.hak5.org/products/lan-turtle

          Assume physical access, someone walks in and has 5 minutes out of sight. A decent wpa2 password would take an extraordinary long time to brute force. Something like above gets deployed and allows remote access in seconds on an unprotected lan. As noted in another comment sketchy IOT gear is a threat people install willingly. The old test of leaving a loaded USB in the parking lot catches more people than is reasonable. Don’t assume a physical door is going to stop someone more than a proper technical barrier.