lotwhite 发表于 2014-9-18 21:24

这种情况是不是无线路由被人攻击了

事情是这样,上周五我们后楼一个年轻人跑来要我家wifi密码

因为那人的爸爸和我爸很熟,我爸就让我给他了

但是我心里很是恶心,那人连上wifi后一走我就把他的MAC拉黑名单了

但是过了十分钟我就觉得网很卡,进路由管理看他的MAC地址最后一组换了两位又连进来了

一怒之下直接改了密码

然后从第二天开始网络就变得超级卡,平时玩的网游连接响应速度都是15~30 直接就变成70~100多

但是进路由管理看除了我家一台电脑三个手机再没有什么怪设备了

也设置成管理只允许自己的台式机登陆了,也就以为是网络这几天有点问题想着等几天看怎么样

结果今天上网一半的都上不去(百度贴吧,天凤,还有我经常上的一个论坛)重启路由后则是直接连不上网了黄感叹号那种

最后reast了路由后才正常了

然后才觉得奇怪,就算宽带有问题一般都是直接就上不去,不会有这么奇怪的情形吧

而且出问题就在那个第二天,我就怀疑是不是那个人打击报复故意攻击什么的,那人是学计算机的也在电脑城打过五六年工,估计是个电脑高手吧

如果真的是攻击那么有什么解决方法么

Gato_shin 发表于 2014-9-18 21:35

看日志,就知道了
方法?這個路由拔了貓密碼改回去讓他隨便玩去
而且為啥要用mac黑名單,開白名單啊

lotwhite 发表于 2014-9-18 21:37

Gato_shin 发表于 2014-9-18 21:35
看日志,就知道了
方法?這個路由拔了貓密碼改回去讓他隨便玩去
而且為啥要用mac黑名單,開白名單啊 ...

电脑渣表示完全看不懂……



Jan1 00:00:11 feixun user.notice kernel: 0x00050000-0x001090cf : "Kernel"
Jan1 00:00:11 feixun user.warn kernel: mtd: partition "Kernel" doesn't end on an erase block -- force read-only
Jan1 00:00:11 feixun user.notice kernel: 0x001090cf-0x00400000 : "RootFS"
Jan1 00:00:11 feixun user.warn kernel: mtd: partition "RootFS" doesn't start on an erase block boundary -- force read-only
Jan1 00:00:11 feixun user.notice kernel: 0x00050000-0x003e0000 : "Kernel_RootFS"
Jan1 00:00:11 feixun user.notice kernel: 0x003e0000-0x003f0000 : "nvbackup"
Jan1 00:00:11 feixun user.notice kernel: 0x003f0000-0x00400000 : "nvram"
Jan1 00:00:11 feixun user.info kernel: squashfs: version 3.2-r2 (2007/01/15) Phillip Lougher
Jan1 00:00:11 feixun user.warn kernel: squashfs: LZMA suppport for slax.org by jro
Jan1 00:00:11 feixun user.info kernel: io scheduler noop registered (default)
Jan1 00:00:11 feixun user.warn kernel: Ralink gpio driver initialized
Jan1 00:00:11 feixun user.info kernel: HDLC line discipline: version $Revision: 1.1.1.1 $, maxframe=4096
Jan1 00:00:11 feixun user.info kernel: N_HDLC line discipline registered.
Jan1 00:00:11 feixun user.info kernel: Serial: 8250/16550 driver $Revision: 1.8 $ 2 ports, IRQ sharing disabled
Jan1 00:00:11 feixun user.info kernel: serial8250: ttyS0 at I/O 0xb0000500 (irq = 37) is a 16550A
Jan1 00:00:11 feixun user.info kernel: serial8250: ttyS1 at I/O 0xb0000c00 (irq = 12) is a 16550A
Jan1 00:00:11 feixun user.info kernel: loop: loaded (max 8 devices)
Jan1 00:00:11 feixun user.warn kernel: rdm_major = 253
Jan1 00:00:11 feixun user.warn kernel: Ralink APSoC Ethernet Driver Initilization. v2.164 rx/tx descriptors allocated, mtu = 1500!
Jan1 00:00:11 feixun user.warn kernel: MAC_ADRH -- : 0x0000d842
Jan1 00:00:11 feixun user.warn kernel: MAC_ADRL -- : 0xac88d839
Jan1 00:00:11 feixun user.al kernel: PROC INIT OK!
Jan1 00:00:11 feixun user.info kernel: IMQ starting with 2 devices...
Jan1 00:00:11 feixun user.info kernel: IMQ driver loaded successfully.
Jan1 00:00:11 feixun user.info kernel:         Hooking IMQ after NAT on PREROUTING.
Jan1 00:00:11 feixun user.info kernel:         Hooking IMQ before NAT on POSTROUTING.
Jan1 00:00:11 feixun user.info kernel: PPP generic driver version 2.4.2
Jan1 00:00:11 feixun user.info kernel: PPP Deflate Compression module registered
Jan1 00:00:11 feixun user.info kernel: PPP BSD Compression module registered
Jan1 00:00:11 feixun user.info kernel: PPP MPPE Compression module registered
Jan1 00:00:11 feixun user.info kernel: NET: Registered protocol family 24
Jan1 00:00:11 feixun user.info kernel: PPPoL2TP kernel driver, V0.17
Jan1 00:00:11 feixun user.info kernel: PPTP driver version 0.8.1
Jan1 00:00:11 feixun user.info kernel: block2mtd: version $Revision: 1.1.1.1 $
Jan1 00:00:11 feixun user.warn kernel: Netfilter messages via NETLINK v0.30.
Jan1 00:00:11 feixun user.warn kernel: nf_conntrack version 0.5.0 (128 buckets, 1024 max)
Jan1 00:00:11 feixun user.warn kernel: ip_tables: (C) 2000-2006 Netfilter Core Team, Type=Restricted Cone
Jan1 00:00:11 feixun user.warn kernel: ipt_time loading
Jan1 00:00:11 feixun user.warn kernel: init Domainarp_tables: (C) 2002 David S. Miller
Jan1 00:00:11 feixun user.info kernel: TCP cubic registered
Jan1 00:00:11 feixun user.info kernel: NET: Registered protocol family 1
Jan1 00:00:11 feixun user.info kernel: NET: Registered protocol family 17
Jan1 00:00:11 feixun user.info kernel: 802.1Q VLAN Suppor
Jan1 00:00:11 feixun user.info kernel: t v1.8 Ben Greear <greearb@candelatech.com>
Jan1 00:00:11 feixun user.info kernel: All bugs added by David S. Miller <davem@redhat.com>
Jan1 00:00:11 feixun user.warn kernel: VFS: Mounted root (squashfs filesystem) readonly.
Jan1 00:00:11 feixun user.info kernel: Freeing unused kernel memory: 112k freed
Jan1 00:00:11 feixun user.warn kernel: Algorithmics/MIPS FPU Emulator v1.5
Jan1 00:00:11 feixun user.err kernel: devpts: called with bogus options
Jan1 00:00:11 feixun user.warn kernel: rt2860v2_ap: module license 'unspecified' taints kernel.
Jan1 00:00:11 feixun user.warn kernel:
Jan1 00:00:11 feixun user.warn kernel: phy_tx_ring = 0x00e30000, tx_ring = 0xa0e30000
Jan1 00:00:11 feixun user.warn kernel:
Jan1 00:00:11 feixun user.warn kernel: phy_rx_ring0 = 0x00e31000, rx_ring0 = 0xa0e31000
Jan1 00:00:11 feixun user.warn kernel: MAC_ADRH -- : 0x0000d842
Jan1 00:00:11 feixun user.warn kernel: MAC_ADRL -- : 0xac88d839
Jan1 00:00:11 feixun user.warn kernel: RT305x_ESW: Link Status Changed
Jan1 00:00:11 feixun user.warn kernel: CDMA_CSG_CFG = 81000007
Jan1 00:00:11 feixun user.warn kernel: GDMA1_FWD_CFG = C0710000
Jan1 00:00:11 feixun user.warn kernel: RT305x_ESW: Link Status Changed
Jan1 00:00:11 feixun user.warn kernel: RT305x_ESW: Link Status Changed
Jan1 00:00:11 feixun user.warn kernel: 0x1300 = 00064380
Jan1 00:00:11 feixun user.debug kernel: eth2.1: add 01:00:5e:00:00:01 mcast address to master interface
Jan1 00:00:11 feixun user.warn kernel: eth2.2: Setting MAC address tod8 42 ac 88 d8 39.
Jan1 00:00:11 feixun user.warn kernel: VLAN (eth2.2):Underlying device (eth2) has same MAC, not checking promiscious mode.
Jan1 00:00:11 feixun user.debug kernel: eth2.2: add 01:00:5e:00:00:01 mcast address to master interface
Jan1 00:00:11 feixun user.info kernel: eth2.1: dev_set_promiscuity(master, 1)
Jan1 00:00:11 feixun user.info kernel: device eth2 entered promiscuous mode
Jan1 00:00:11 feixun user.info kernel: device eth2.1 entered promiscuous mode
Jan1 00:00:11 feixun user.warn kernel: RtmpOSNetDevDetach(): RtmpOSNetDeviceDetach(), dev->name=ra0!
Jan1 00:00:11 feixun user.warn kernel: 0x1300 = 00064380
Jan1 00:00:11 feixun user.info kernel: device ra0 entered promiscuous mode
Jan1 00:00:11 feixun user.info kernel: br0: port 2(ra0) entering learning state
Jan1 00:00:11 feixun user.info kernel: br0: port 1(eth2.1) entering learning state
Jan1 00:00:11 feixun user.info kernel: br0: topology change detected, propagating
Jan1 00:00:11 feixun user.info kernel: br0: port 2(ra0) entering forwarding state
Jan1 00:00:11 feixun user.info kernel: br0: topology change detected, propagating
Jan1 00:00:11 feixun user.info kernel: br0: port 1(eth2.1) entering forwarding state
Jan1 00:00:11 feixun daemon.info pppd: Plugin rp-pppoe.so loaded.
Jan1 00:00:11 feixun daemon.info pppd: RP-PPPoE plugin version 3.3 compiled against pppd 2.4.2
Jan1 00:00:11 feixun daemon.notice pppd: pppd 2.4.2 started by admin, uid 0
Jan1 00:00:11 feixun daemon.info pppd: PPP session is 8347
Jan1 00:00:11 feixun daemon.info pppd: Using interface ppp0
Jan1 00:00:11 feixun daemon.notice pppd: Connect: ppp0 <--> eth2.2
Jan1 00:00:11 feixun user.info syslog: Password for 'admin' changed
Jan1 00:00:12 feixun daemon.crit dnsmasq: failed to create listening socket: Address already in use
Jan1 00:00:12 feixun daemon.crit dnsmasq: FAILED to start up
Jan1 00:00:14 feixun daemon.info pppd: CHAP authentication succeeded: Authentication success,Welcome!
Jan1 00:00:14 feixun daemon.notice pppd: peer from calling number 00:25:9E:F1:C1:4E authorized
Jan1 00:00:14 feixun daemon.notice pppd: localIP address 10.21.49.72
Jan1 00:00:14 feixun daemon.notice pppd: remote IP address 10.21.0.1
Jan1 00:00:14 feixun daemon.notice pppd: primary   DNS address 61.232.202.158
Jan1 00:00:14 feixun daemon.notice pppd: secondary DNS address 211.98.2.4
Dec 31 16:00:18 feixun daemon.crit dnsmasq: failed to create listening socket: Address already in use
Dec 31 16:00:18 feixun daemon.crit dnsmasq: FAILED to start up
Jan1 00:00:19 feixun user.warn kernel: HTB: quantum of class 10003 is big. Consider r2q change.
Jan1 00:00:19 feixun user.warn kernel: HTB: quantum of class 10111 is small. Consider r2q change.
Jan1 00:00:19 feixun user.warn kernel: HTB: quantum of class 10111 is small. Consider r2q change.

死神之镰 发表于 2014-9-18 21:37

换个SSID,设置成不广播,估计那位在用算号器暴力破解的wifi密码呢,你路由CPU过载就响应迟钝了

lotwhite 发表于 2014-9-18 21:39

死神之镰 发表于 2014-9-18 21:37
换个SSID,设置成不广播,估计那位在用算号器暴力破解的wifi密码呢,你路由CPU过载就响应迟钝了 ...

额设置成不广播的话是不是我家手机也上不了了

Gato_shin 发表于 2014-9-18 21:43

lotwhite 发表于 2014-9-18 21:39
额设置成不广播的话是不是我家手机也上不了了

讓你隱藏ssid,沒讓你關無線

死神之镰 发表于 2014-9-18 21:43

lotwhite 发表于 2014-9-18 21:39
额设置成不广播的话是不是我家手机也上不了了

可以手动填写的

抡神 发表于 2014-9-19 08:23

本帖最后由 抡神 于 2014-9-19 08:33 编辑

还不广播,还什么白名单,都不知道卡皇这玩意吗,多少年了,这玩意蹭网报纸电视全上了,真都没听说过吗?
这活不用开电脑有个带usb口刷了第三方固件的路由器插个大功率网卡就能干了

密码类型用wpa2,认他算去吧

----发送自 LGE LG-US780,Android 4.1.2

hanqi7012 发表于 2014-9-19 08:46

买个新路由器用……老路由器断网插电上密码让他搞

ichinose 发表于 2014-9-19 09:59

不广播又不是找不到,只是看不到罢了.再买个路由器改成名字一样的让他算去

shazuna 发表于 2014-9-19 10:31

记得新路由要有对付bruteforce的功能, 遇到不停重试密码的连接请求 ban mac。

kissmore_as 发表于 2014-9-19 16:03

隐藏SSID和MAC地址过滤是没有用的,只有wpa2强密码可用

00113722 发表于 2014-9-19 17:07

StarForcePro 发表于 2014-9-19 21:17

lentrody 发表于 2014-9-19 21:42

老弗 发表于 2014-9-20 08:03

最简单也是最有效的办法就是更换5G控制信号传播范围让隔壁抓不到包,什么隐藏ssid mac白名单都没什么用,还有别开qss功能,wpa2现在只能靠暴力破解,还是比较安全的。
页: [1]
查看完整版本: 这种情况是不是无线路由被人攻击了