"How to look who is connected"

"How to look who is connected"

Digital Hits: 66

The problem of definition of unauthorized connection to a wireless network of Wi-fi can become important for each user. The authentication methods applied in routers of the last generations practically with guarantee exclude a possibility of cracking of access point, however in old models there are some vulnerabilities.

Instruction

1. Check stability and stability of speed of wireless connection. Regular reduction of speed can be the evidence of unauthorized connection. It can lead to increase in time of execution of loadings of files, gaining access by malefactors to confidential information saved on the computer, and even to use of access point as cover for implementation of illegal acts on the Internet.

2. Switch-off all electronic devices able to carry out access to the network, and check a WAN indicator status. The active status of the indicator (blinking) serves as an indicator of others connection.

3. Open the main menu of the Windows operating system by clicking of the Start-up button and pass into the Execute point" for definition of the IP addresses of the existing connections.

4. Enter cmd value in the Open field and use a function key of Enter for confirmation of start of the tool of the command line.

5. Enter value
ipconfig
to the test field of the command interpreter also click the ENTER key to confirm command execution.

6. Define value of the address of the router in the field of Default Gateway in the Ethenet Adaptor Local Area Connection group and remember it.

7. Start the used browser and enter the router IP address in the test field of an address bar (by default 192.168.1.1) for a web device interface call.

8. Enter values of a name of the account and the password in the respective fields of a window of request of a system and pass into the section Connected Devices (the Client List option is possible) and define all attached devices by name, to MAC- or the IP address.

9. Use the specialized tool of the analysis of network traffic and definition of the attached devices MoocherHunter, freely extended in the Internet and consisting on arms of law enforcement agencies.

Author: «MirrorInfo» Dream Team

Print