Network Security Issue

Gringo428

Commendable
May 16, 2016
1
0
1,510
Hi Guys,
I've been noticing strange behaviors on my home LAN (slow, large files being sent that I didn't initiate, etc). I was recently on my brother in laws LAN and scanned it with F'ing. My router and its MAC address show on his system, with the same assigned IP as his router. I scanned my Belkin router on his LAN and found it controlled port 23 Telnet, port 80 Http and port 21 FTP.
He has my login data, as he's a frequent quest in our home. I have screen shots of both networks (showing what I attempted to explain). I want to know if this prick has been capturing my passwords, email and using my computers camera and microphone.
I should also add that by brother in law frequently uses my computer (knows password) and the network router password. I never had a reason not to trust him - hope I still don't
Please let me know if you guys can clarify any of this -
Respectfully,
Bill
PS - I don't know how to post screen shots. But I have the F'ing screens from both networks
 
Solution
Maybe the data could be intercepted but generally you see major performance issues with the arp poison method. Any other method requires software on the router or a dedicated tap hardware.

If the traffic is encrypted with say https then you can see very little. Just with network traffic collection you would only see things that were sent non encrypted. A VPN would prevent all forms of traffic inception.

Still it is very unlikely since you need special router firmware to really do it. The ARP attack method is easily defeated by putting a static ARP for the gateway/router in your machine. You can also assign a static ip to your machine so that he could not use a second DHCP...although a second DHCP server generally causes...
Maybe the data could be intercepted but generally you see major performance issues with the arp poison method. Any other method requires software on the router or a dedicated tap hardware.

If the traffic is encrypted with say https then you can see very little. Just with network traffic collection you would only see things that were sent non encrypted. A VPN would prevent all forms of traffic inception.

Still it is very unlikely since you need special router firmware to really do it. The ARP attack method is easily defeated by putting a static ARP for the gateway/router in your machine. You can also assign a static ip to your machine so that he could not use a second DHCP...although a second DHCP server generally causes massive problems.
 
Solution