Most of our features and services are available only to members, so we encourage you to login or register a new account. Registration is free, fast and simple. You only need to provide a valid email. Being a member you'll gain access to all member forums and features, post a message to ask question or provide answer, and share or find resources related to mobile phones, tablets, computers, game consoles, and multimedia.
All that and more, so what are you waiting for, click the register button and join us now! Ito ang website na ginawa ng pinoy para sa pinoy!
theres a problem with poe if theres are large induction along the way of the signals example wire windings such as those inside powersaving boxes
sir, ano po internet connection gamit mo?...
ok bro, dun lang ako medyu nalito sa Captive portal monowall.
Anu ba tlaga dun gnagamit mu Captive portal? monowall? or pfsense? or packet fence?
Cenxa bro nalito lang tlaga, na try ko install mga yan pero medyu mahirap. Paki include lang sana procedures mu dito bro at kung anu OS gamit mu... thanks tol at gudluck sa business..
up ko lang tol...
sa ngaun bro MonoWall gamit q, mas maganda kc features ng monowall sa Captive portal eh, my voucher System na dn ska mas mababa ang system requirements e2 sample ng portal q. View attachment 303720
at e2 ung distance ng wifi q sa mga clients q.
View attachment 303726
baka malugi ka jan ts.... paano kung my gumagamit jan sa inyo ng linux bactrack na os???
kayang nyang butasin khit cisco na router.
info lng TS
pero TS... astig parin business mo
hahaha,,, nka CAPTIVE PORTAL ako bro, nkaopen wifi security q, pero pagngbrowse na cla mgreredirect cla sa page q, ang backtrack bro para lang sa wpa, wpa2 at wep encryption. kaya wala epek un.. hehe,, ska mamomonitor q sa portal ko kung sinong nakaconnect,
On the contrary, it is relatively easy to crack Captive Portals. Although cracking WPA/WPA2 and WEP networks are the more popular reasons to use BackTrack, hindi lang po ito ang gamit ng BackTrack. Kung tutuusin pang-beginner pa nga lang ang mga method na ito. Kahit i-Google lang ninyo makikita na ninyo ang basic steps kung paano ma-bypass ang Captive Portal. In fact, these "other applications" that can bypass Captive Portals are part of downloadable/installable applications from Ubuntu, kahit hindi na kayo mag-BackTrack.
Pero I don't think I will need to discuss the steps to do it. Hindi natin hangarin na sirain ang business ng kasama natin. I'm just pointing out that Captive Portals seem to be very secure and well-protected, but only from a limited number of cracking methods (such as methods like aircrack-ng). However, may vulnerability siya na kayang-kayang i-exploit using the other methods/apps that are available in BackTrack. Kung ano man yun, hmmm...sorry hindi ko na lang sasabihin. Respect na lang natin, negosyo ito eh.
Simply lang sulotion jan,
1. block mu sa monowall yung MAC Address lng LAN Card nya.
2. Drop mu sa IP tables lahat ng packet ng IP Address nya.
Makita mu mn sa Captive Portal lahat ng MAC Address at IP Address ng mga nka connect sa Wifi mu.
Try using Packet Fence Captive Portal.
Kung may vulnirabilities pa jan post nyu dito.
DROP ALL PACKETS BY DEFAULT
Lets take option #2:
IP Tables Firewall config is
Then allow only your clients IP address.Code:DROP ALL PACKETS BY DEFAULT
Another is --> DROP ALL Subnets ng attacker sa IP Tables.
Correct but again, if the attacker spoofs his own MAC Address to that of an already-recognized (client/guest) MAC Address, then the host will think that the attacker is not the attacker but instead, part of his customers (those with MAC Addresses that belong to his "allowed" group). In other words, if two machines have the same MAC Addresses (e.g. carbon-copy), the host can't determine which is "original" and which is "fake". Yes we do know that no two machines will ever have the same MAC Address (MAC Address is like a unique fingerprint of each device), hence MAC spoofing. The 2 methods you have described will work if the host knows that a certain MAC Address is "not welcome"...in essence the counter-attack you suggested is targeted to a MAC Address that the host knows that is "not welcome".
He could probably change his network from "Open" to "Closed" via WPA/WPA2 (which can't be since he wants to set up a Captive Portal)...however he is using it for business...what if one of his customers has more than one machine? The customer may complain that he already paid but can't connect his other machine (probably because of MAC filtration procedures already mentioned)....unless his business policy would be for the customer to pay one subscription per machine.
Again, both methods only protect the host itself from direct attacks. Also, both methods described assume that you are able to correctly identify the attacker. Otherwise you may end up blocking even the legitimate client/guest/customer. On the other hand, both methods you described is good protection only if you are planning to protect a network that is for personal use (e.g. you know exactly which machines/devices are allowed to connect) and not for business use.
Nice!
MAC spoofing would work but how about blocking your IP address from firewall? or how can you access if your IP is totally blocked including all your subnets?
Changing IP takes more time than blocking from IP Tables firewall.