I have two routers in use, with one device acting only as another wireless access point. The main router is a Fritzbox, the second router is a TP-Link device.
Already a few months ago, maybe even over a year, was noticed in the Fritzbox that there had an unknown device latched. I had changed the password of the WLAN access, but had not considered changing the password of the second router, which was exactly the same.
Now I've installed a new Fritzbox this weekend, and I noticed that a device was connected to the network, via the second router.
The MAC address of the device seems to be set manually and will be found as "Private". I also changed the password of the second router, since then the device tries to log in every few seconds, which of course fails.
Of course, you think about whether there's not any device that you have bought and connected to the network and then forgot. I have been able to assign all the devices that I know, a TV, two Raspberry Pi, two mobile phones, two tablets, two notebooks, two computers, a controllable socket, a Fire Stick, the routers, a NAS (per Electric wire).
If this device would eventually hook up again, then that would be a proof that someone has hacked and the password has been determined again.
How do you make an ad in this case, just report it to the police, and do you know anything about it?
Encryption is of course set to WPA2, but I know these passwords are no longer completely secure.
Change your SSID (WLAN name, if you have several, then all SSIDs) and also the WLAN key.
If login attempts continue to occur, you can file a criminal complaint with the police. Because also the attempt to use a WLAN without permission of the owner is punishable.
Here is a case from Wuppertal, who was in court:
http://www.justiz.nrw.de/nrwe/lgs/wuppertal/ag_wuppertal/j2007/29_Ds_70_Js_6906_06__16_07_urteil20070403.html
Thanks for the answer. I had already changed the password anyway, I'll change the whole thing again to a completely new password and do it regularly.
I then did some research on how to simplify a WPA network the easiest way, and I was appalled how easy it is. Install a software and a few tools, and you can show yourself to a user of a WLAN as a cloned access point and prompt for the input of the Wi-Fi password. If he does not realize that (and I or my wife will not notice), the attacker will have the wi-fi password and will be able to connect.
WIrd probably be a Kiddi whose Internet is managed by the parents. Can only be close to the floor with me, so plus minus a floor, so I think.
In the future, therefore, I will have to be more careful when a device does not come online. Could be Blag cvom neighbors who want to make mischief at my expense on the Internet.
Yes, this is called honey pot principle, a name similar Wi-Fi hotspot operated in your area attracts all your wireless devices. The betray then the attacker their stored password. Yes that's annoying, that goes something.
Proposals:
Define 2 profiles in your router. All known devices the profile "may see and do everything" and new wireless devices "may nothing, only e-mail, no http, …". Thus, new uninvited guests are severely limited.
Change your SSID and reduce the transmit power in the router so that the neighbor's villain can't reach it that easily. You can also seal the router with an aluminum paper in the undesirable direction (DIN A4 sheet / cardboard flat with aluminum paper pasted), just put in between.
Set the timer for your WLAN in the router?
Turn off your router and repeater, if there's still a Wi-Fi network with your SSID, so take a smartphone (with the free app of AVM "Fritz App Wi-Fi" https://avm.de/...app-wlan/) and run it through your apartment or corridor and follow the Source. With the A4 sheet of aluminum paper… Can you tell the direction where the "honey pot" comes from. You will track down the flat where the villain is at work. Ringing and a clear announcement to the parents make "criminal complaint to the police androhen…", that will certainly show effect, at least with the parents of the villain.
Turn on the MAC filter in the router & repeater ("allow access only to known devices"), then the villain has a particularly hard time getting in!
The MAC filtering I have now schion inside. But that still needs to be perfected. That which is operated there's not a Hionigtopf, because that would be always on. This pot is operated only for a short time, once is enough to reveal the password. I'm looking for a tool to search for the Mac address. Have Linux on the computers, still no sniffer found that would have brought me further.
Look in the router protocol, there's the MAC address of the villain.
At least FritzBoxen is visible under (system / event log / …)