Most of this is SOP for most Tech Talk posters, but I figured some posters here don't know all this.Anything else on top of these procedures that you guys can thank of? Doesn't resetting the default gateway address of the router (from 192.168.X.X) offer some protection?
7/5/2007 5:09:24 PM
WEP + MAC filtering + disable SSID Broadcast is more than enough for the average user in any apartment or townhome complex. no serious hacker that can by-pass that is going to care and/or try to hack a nobodies network.
7/5/2007 5:12:57 PM
WEP < WPA < just don't connect period.
7/5/2007 5:20:32 PM
shouldn't it be WPA + MAC filtering + disable SSID
7/5/2007 5:20:56 PM
I'm just saying...you guys really have nothing hack worthy on your networks.
7/5/2007 5:24:16 PM
well, that's not exactly for you to say, but I don't see any reason not to use WPA, when it's just as easy to enable on any wireless router as WEP is....
7/5/2007 5:43:54 PM
its for common sense to say. If you have sensitive material your work place will require you to have certain security protocals before they even let you remote in from a home network. If you are hiding gigs and gigs of pirated material...then you are probably smart enough to secure your network
7/5/2007 5:49:25 PM
If a "hacker" can identify a machine that is connected to your wireless network (i.e. he sees you on your laptop and so runs a packet sniffer on his from nearby), it is not a challenge at all to obtain your MAC address (which can then be used to defeat MAC filtering) and your SSID (if it's not being broadcast).Prepackaged WEP cracking software exists that can crack a WEP key in seconds or minutes. All 3 schemes can be bypassed without any "hacking" at all.None of those options offer anywhere near the protection offered by WPA or WPA2.[Edited on July 5, 2007 at 6:24 PM. Reason : ]
7/5/2007 6:23:21 PM
i'm not arguing wep vs wpa. I'm just saying we don't have anything of value on our networks.
7/5/2007 6:24:34 PM
ok.... so you're saying that anybody who doesn't have sensitive work-related files or gigs of pirated movies and music won't have anything else on any of their computers or their internal network worth anything to anyone from the outside? Or at the least, even just files they would prefer to keep private?You don't keep any tax data, Money files, password databases on your computers? perhaps any pictures you'd rather not anybody else see?I think I agree with your overall point that Yes, you generally don't have to worry about your shit if you're on a WEP or WPA or even an unsecured network. The threat of identity theft or "crazy hackers" turning computer into a zombie, stealing all your files, then erasing all your data, is way overblown - people watching too much 60 Minutes and 20/20. For the most part, nobody gives a shit about your data or your network, and (depending on where you live), you could just leave all your data sitting out in the open and nobody would mess with it.but nonetheless, if you're going to go to the trouble of setting up a wireless network and you want to be able to freely trade files between computers inside the network, then you might as well secure it. And as long as you're securing it, you might as well choose WPA over WEP. I mean, name me one compelling reason to choose WEP over WPA, if they're both available and supported by your router and all your computers?[Edited on July 5, 2007 at 6:30 PM. Reason : .]
7/5/2007 6:29:11 PM
7/5/2007 6:36:15 PM
7/5/2007 6:55:32 PM
http://www.wirelessdefence.org/Contents/Wireless%20Pen%20Test%20Framework.html
7/5/2007 6:56:31 PM
^ whats the "Deauth Client" step in that diagram? So the best way to crack WPA is dictionary/brute force? this is where 20 character passphrases come in handy huh?]
7/5/2007 7:01:43 PM
"Deauth Client" means cause the client to become disconnected from the network and have to reconnect (this can be done by sending bogus network traffic)
7/5/2007 7:14:32 PM
mac filtering and disabling broadcasting of ssid doesn't do much.
7/5/2007 8:59:52 PM
deauth and then get the client to associate with your rogue AP while you pretend to be legit
7/5/2007 9:26:35 PM
here is a larger versionhttp://www.wirelessdefence.org/Contents/Wireless%20Pen%20Test%20Framework_001.html
7/5/2007 9:28:13 PM
nothing compares to a good passphrase/password that's not in the dictionary (for WPA)chances are even if they are a good hacker and can get their foot in the door, they can't fully get it in unless they get lucky with a dictionary/brute force attack[Edited on July 5, 2007 at 10:08 PM. Reason : .]
7/5/2007 10:06:59 PM
I leave my shit wide open.I let upper layer protocols handle security.
7/6/2007 6:19:50 AM
802.1x
7/7/2007 3:06:21 AM
I always get people to use a sentence or a previous address for the WPA password. Dictionary attacks are useless and WPA cracking is near impossible when you use a long passphrase.
7/7/2007 5:22:23 PM