Well, i am not that well versed in passwords. DNS from ephemeral ports is less passwordy than direction of remaining entries.
both, no, he is only using the pc
where did i said wifi password?
of course, a repeater needs the wifi password of the main router, it would be stupid to steal a key you already have , isn't ?
but i never spoke of "wifi" keys, im speaking of this new business of cookie stealing of stealing passwords stored in opened sessions in the browser
Then use https://openwrt.org/docs/guide-user/base-system/dhcp_configuration#client_classifying_and_individual_options to tell the MAC they use, to query 8.8.8.8 or some other public DNS instead of yours.
Unless they can brute force HTTPS, passwords are probably hard to steal, without direct access to device where they're stored/used.
ok ok, thank you!
Now you said it
Time to post the output of
ubus call system board
why you want that?
Because next to white rectanges some un-openwrt-y things spill out.
ahh its my mac chrome i have set dark theme on my wrt
Are you using OpenWRT?
yes sir
This really makes no sence…
If you as a self defined “cybersecurity whatever” first actually invite the neighbours/theives and then complain about their behavior.
Why would any “cybersecurity whatever” even start thinking about invite a neighbor to the network which they don’t even trust to begin with?
And on top of that actually invite them to the core network and not to a separate isolated vlan!?
repeater probably can't do it, separate subnet would suffice.
it's been suggested.
Well we can draw a big line over “cybersecurity” here because that is obviously non existent in this question both on hardware, operational and organization level.
good point ...
He may also be running Wireshark, tcpdump, etc to try to snoop something. By default the tool would do a DNS lookup on every IP it sees.
suspicion was true. i was receiving dns rebinding attacks from the neighboor router.
And you came to this conclusion based on?
yes.
redacted