For those who's Orbi's are under warranty, can they be returned for a new Orbi? If you have to do a factory reset and lose your config and if it still doesn't work then it seems simpler to just get a new one.
Others have found that doing a factory reset and setup from scratch using a wired PC and web browser with HTTP and 192.168.1.1 should work as well. I would disconnect the RBR from the ISP modem/ONT temporarily while you do this and then walk thru the setup wizard.
If any of these fail to bring the orbi system back to ready and full access, then you'll need to contact NG support and ask for there help and information. They'll need to determine next course of action for you.
Knowing how to see who's using your Wi-Fi helps you identify intruders who are "piggybacking" on your network and getting their internet for free. Not only can this unauthorized access slow down your connection, but it also poses a security risk if the Wi-Fi thief is also able to steal your personal data or infect your network with malware.
Changing your Wi-Fi password will boot freeloading neighbors and other interlopers off your network, but it's an unnecessary hassle if there's nothing untoward going on. For this reason, it's useful to monitor your Wi-Fi closely, so you can detect unusual activity and spot suspicious devices as soon as they connect.
There are several free tools that show you who's using your Wi-Fi in real time, for both your desktop computer and your mobile device. In our guide below, we'll explain how to use two of the best network monitors currently available, so you can catch Wi-Fi thieves in the act.
One of the easiest ways to monitor your Wi-Fi network on your Windows PC is to use the free program Wireless Network Watcher. Created by the prolific software developer Nir Sofer, aka NirSoft, this simple tool shows you exactly which devices are currently connected to your network, so you can quickly identify unusual and unauthorized activity. Here's how to use it.
Available for Android and iOS, this network scanner provides lots of useful information about all the devices that are connected to your Wi-Fi, so you can quickly detect intruders. Here's how to use Fing.
1. Install Fing - Network Tools on your Android phone or tablet from the Google Play Store, or install Fing Network Scanner on your iPhone or iPad from the Apple App Store. The app is free to use on both platforms, though it does have optional in-app purchases.
Robert Irvine was previously the How-To Editor at Tom's Guide. He has been writing tutorials about software, hardware, websites and other tech topics since the days of dial-up modems, and was previously the editor of Web User magazine. Robert enjoys cooking, and makes a mean sausage casserole, but is definitely not the celebrity chef of the same name."}), " -0-9/js/authorBio.js"); } else console.error('%c FTE ','background: #9306F9; color: #ffffff','no lazy slice hydration function available'); Robert IrvineSocial Links NavigationRobert Irvine was previously the How-To Editor at Tom's Guide. He has been writing tutorials about software, hardware, websites and other tech topics since the days of dial-up modems, and was previously the editor of Web User magazine. Robert enjoys cooking, and makes a mean sausage casserole, but is definitely not the celebrity chef of the same name.
To get a gut check on this, I spoke at length last week with University of Michigan researcher Zakir Durumeric (ZD) and Michael D. Bailey at the University of Illinois at Urbana-Champaign (MB) about their ongoing and very public project to scan all the Internet-facing things. I was curious to get their perspective on how public perception of widespread Internet scanning has changed over the years, and how targeted scanning can actually lead to beneficial results for Internet users as a whole.
ZD: We took everyone on the IPv4 address space, found those that were vulnerable, and then contacted the registered abuse contact for each block of IP space. We used data from 200,000 hosts, which corresponded to 4,600 abuse contacts, and then we split those into an A/B test. [Their research on this testing was published here].
Another interesting challenge was that we did some filtering as well in cases where the IP address had no known patches. So, for example, where we got information from a national CERT [Computer Emergency Response Team] that this was an embedded device for which there was no patch available, we withheld that notification because we felt it would do more harm than good since there was no path forward for them. We did some aggregation as well, because it was clear there were a lot of DSL and dial-up pools affected, and we did some notifications to ISPs directly.
BK: You must get some pushback from people about being included in these scans. Do you think that idea that scanning is inherently bad or should somehow prompt some kind of reaction in and of itself, do you think that ship has sailed?
Firewalls, IDS/IPS, and security devices that analyze netflows will all alert on various types of scanning activity (e.g., one IP to many IPs on a single port, scanning IPs across multiple or all ports, sequential or random scanning of a range of IPs by a single or multiple IPs, etc.).
This information published at scans.io is very fascinating to analyze and is scary to see the overall security posture of the internet. Kudos to the research and researchers. Here is some analysis I have done on the information:
I have a coworker who has a wifi-enabled garage door opener and it alerts him on his phone when it opens or closes. He can also open or close it from his phone. The question is: Who else can control his garage door?
Wifi devices connected to your home network are likely behind your DSL/Cable router, which does not let outside connections in unless you have specifically allowed them. Thus no one on the internet can even see your device let alone scan it. Your router will be blocking all scans.
A mobile device first shipped w/in the last year, running a supported OS and where you proactively update to the latest is the next wrt security. The more third party apps you install, the more likely it is to be insecure by some definition.
The hacking skills required for this type of attack are fairly high because no scripts have been released and the installs are uncommon. The value to the attacker would be based upon the material stolen: (1) information (pictures of you naked, stuff from your home computer, your schedule at your house) or (2) things (whatever you have of value in your home, probably keys to a car for most, some artwork or jewelry for others).
Much better return to attack a commercial enterprise, large or small business, as they have things of greater value and more common infrastructure. However, there are a lot more homes than companies, so eventually, when IP devices are prolific and before we have a way to update their embedded software and without knowledgable home IT departments (perhaps never on that last one), some criminals will break into homes through devices vulnerabilities.
I can imagine someone WAR-walking through a city, scanning Wifi systems for vulnerabilities and looking for wifi enabled devices *or* attacking the central servers and climbing through them as a back channel.
Brian,
I wonder if there is also a subset of internet users, companies, educational institutions, etc who not only welcome being scanned in the interest of research but who actually request it in order to stay on top of their own security vulnerabilities?
There are several open source software packages that easily offer the ability to conceal the services you have running on the other side of your perimeter, fwknop being one of the better maintained versions implementing single packet authorization.
To take it a step further, on the other side of your gateway you can and should restrict local user access and make everything immensely more secure by combining things like SPA and 2FA (on a seprate device such as mobile or dongle) with NAT/SNAT/DNAT.
If you protect your legitimate remote access ports for services such as SSH, RDP, and others, with defensive layers such as this and other technologies like SDN and SDP, as well implementing things like two-factor OTP tokens via secondary device and/or biometric auth at every user credential transaction across as many devices/platforms as possible but critically on every server/account with sensitive data, along with encryption where possible, you will greatly increase the effectiveness of your existing SIEM and DevOps infrastructure.
I asked them to stop and they did. Why? We look for anomalies and a major one is connections to our servers by IP address rather than by DNS name. No legitimate user of our public services would ever do that and they raised a flurry of alerts every time they did it, which escalated a call tree. Which usually woke me up. ?
Most of this discussion seems to be around port scanning but what about full blown vulnerability scanning or exploit attempts such as heartbleed or shellshock against public facing assets? These attacks can occur from 1000 different IPs daily against public facing assets. Are these attempts actionable? Should organizations care more about this activity? Or should they view it the same way as port scanning and just accept that if they have a public facing asset it will be hit by all manner of exploits and just focus and doing regular internal vulnerability assessments as well as focus on alerting on post compromise behavior?
Kyle, I stopped being in awe of educators a long time ago, once I became as educated and, sometimes, more experienced, than some of them. Some are pretty good and some are arrogant, petty bullies who appear to look at the rest of us as the great unwashed. Some have real experience and some live in ivory towers.
b1e95dc632