First off all, consider A) any legal implications, B) the risk involved if they do something illegal on your connection, and C) if you aren't seeing numerous repeated back-to-back failed logins in a short amount of time, it may not be malicious activity. It could be, for example, someone who really doesn't grasp how to tell their system to connect to their own WiFi properly, or maybe they accidentally set your SSID as a known network on a phone and they don't know how to delete it.
So of course you can set your wireless router as totally open, or set your WPA2 password to something common, and wait for them to sign on.
To see what others are doing, you need to put the incoming traffic from the WiFi access point through something that can run software to capture and report on what is coming through. Wireshark and the Linux command line version tshark
can give you a live view of what is going on or literally capture all traffic coming through for later analysis. The program squid
, if set up properly on Linux with an appropriate transparent-proxying iptables
configuration, can log each HTTP/HTTPS request.
You may be able to do most of this on the wireless router if it has enough RAM and can be flashed to DD-WRT or OpenWrt. If not, basically you want to disable all routing and DHCP functions on the wireless access point, set up a separate router and DHCP elsewhere, and have another box with two NICs that's "in front" of the wireless access point that can run the above software. I think pretty much you'd want to bridge these two NICs with brctl
or set up simple forwarding with iptables
.
1
Howdy! IMO your question is much too vague as-is. Yes, you could set something up; Traditionally they're refered to as a Honeypot. Additionally just asking for a list of tools to use to set one up is often considered "not constructive". What have you tried already, where are you getting stuck?
– Ƭᴇcʜιᴇ007 – 2013-02-09T14:57:15.2131Not an answer you your question, but for inspiration google on 'upside down ternet' – Hennes – 2013-02-09T15:00:33.140
possible duplicate of How to put fear of God (law) into Wi-Fi hacking neighbors
– Dennis – 2013-02-09T22:09:28.347