Jump to content

Wifi Security


Guest Sinbad The Sailor

Recommended Posts

Guest Sinbad The Sailor
Posted

Good Morning All.

 

Over the weekend, I have been helping my neighbour with her wireless

internet. It has been set up OK, and has WEP protection, but I want to be

sure that it is totally secure.

 

To make sure, I took it upon myself to collect a few tools and attempt to

break into her wireless internet connection. The tools in question were

popular ones such as AirCrack, AirSnort, Easy Wifi Radar, etc.

 

I want to use them on my laptop, which is an Acer Extensa 5220 with an

Broadcom 802.11g Wireless Adaptor and using Windows Vista Home Basic SP1.

 

I cannot configure the wireless adaptor to work with the above programs! I

attempted to start AeroDump (to collect Ivs) but couldn¹t find my adaptor to

work with it! I was attempting to do it via the GUI, not the binaries which

are available.

 

I thank you all in advance for any advice given.

 

-Sinbad

Guest Martin Potestas
Posted

Sinbad The Sailor skrev:<span style="color:blue">

> Good Morning All.

>

> Over the weekend, I have been helping my neighbour with her wireless

> internet. It has been set up OK, and has WEP protection, but I want to

> be sure that it is totally secure.

>

> I thank you all in advance for any advice given.

>

> -Sinbad</span>

 

Hi Sinbad,

 

First off - WEP is not secure at all - it can be cracked in less than a

minute - giving full access to the network for wardrivers.

 

I am using WPA-PSK with AES (as TKIP now also can be cracked).

However the pre shared key cannot be recovered from WPA-PSK TKIP, so if

the transmitted data is not confidential in any way you may use that too.

 

If i was you i would look into BackTrack3

http://www.remote-exploit.org/backtrack.html as not all of the tools

provided for windows is working as good as on Linux.

 

Have a nice day.

 

--

Kind regards

 

Martin Potestas

Microsoft MCP | Astaro ACA, ACE

CompTIA A+, Server+, Linux+

Guest Shenan Stanley
Posted

Wifi SecuritySinbad The Sailor wrote:<span style="color:blue">

> Over the weekend, I have been helping my neighbour

> with her wireless internet. It has been set up OK, and

> has WEP protection, but I want to be sure that it is

> totally secure.

>

> To make sure, I took it upon myself to collect a few tools

> and attempt to break into her wireless internet connection.

> The tools in question were popular ones such as AirCrack,

> AirSnort, Easy Wifi Radar, etc.

>

> I want to use them on my laptop, which is an Acer Extensa

> 5220 with an Broadcom 802.11g Wireless Adaptor and

> using Windows Vista Home Basic SP1.

>

> I cannot configure the wireless adaptor to work with the

> above programs! I attempted to start AeroDump

> (to collect Ivs) but couldn't find my adaptor to work with it!

> I was attempting to do it via the GUI, not the binaries which

> are available.

>

> I thank you all in advance for any advice given.</span>

 

Not sure what your query is...

 

In any case - "WEP" and "secure" are not two words I would use together.

You should change her wireless to WPA2 with a decent length key. If any

part of her network cannot do WPA2 but you actually want her network to be

secure - upgrade that part of the network so it can do WPA2. (Without

hesitation I suggest it above WEP. I suggest it above WPA as well.)

 

As far as running network testing tools - I don't really consider Vista as a

platform for such things. ;-)

 

--

Shenan Stanley

MS-MVP

--

How To Ask Questions The Smart Way

http://www.catb.org/~esr/faqs/smart-questions.html

Guest Sinbad The Sailor
Posted

Shenan,

 

Thank you for the reply, and thanks to all others who replied, there is an

indescribable wealth of knowledge here.

 

My query was for some sort of instruction to help me use the listed programs

for penetration testing.

 

Following your advice, I have changed the security to WPA2 with a 128bit

passkey.

 

Now to the penetration testing! Which is the most effective program to

capture Ivs and see if I can reveal the passkey?

 

Thanks all.

 

-Sinbad

 

 

On 12/01/2009 13:47, in article e7TdhxLdJHA.2400@TK2MSFTNGP03.phx.gbl,

"Shenan Stanley" <newshelper@gmail.com> wrote:

<span style="color:blue">

> Wifi SecuritySinbad The Sailor wrote:<span style="color:green">

>> Over the weekend, I have been helping my neighbour

>> with her wireless internet. It has been set up OK, and

>> has WEP protection, but I want to be sure that it is

>> totally secure.

>>

>> To make sure, I took it upon myself to collect a few tools

>> and attempt to break into her wireless internet connection.

>> The tools in question were popular ones such as AirCrack,

>> AirSnort, Easy Wifi Radar, etc.

>>

>> I want to use them on my laptop, which is an Acer Extensa

>> 5220 with an Broadcom 802.11g Wireless Adaptor and

>> using Windows Vista Home Basic SP1.

>>

>> I cannot configure the wireless adaptor to work with the

>> above programs! I attempted to start AeroDump

>> (to collect Ivs) but couldn't find my adaptor to work with it!

>> I was attempting to do it via the GUI, not the binaries which

>> are available.

>>

>> I thank you all in advance for any advice given.</span>

>

> Not sure what your query is...

>

> In any case - "WEP" and "secure" are not two words I would use together.

> You should change her wireless to WPA2 with a decent length key. If any

> part of her network cannot do WPA2 but you actually want her network to be

> secure - upgrade that part of the network so it can do WPA2. (Without

> hesitation I suggest it above WEP. I suggest it above WPA as well.)

>

> As far as running network testing tools - I don't really consider Vista as a

> platform for such things. ;-)</span>

Posted

Well, if you want to try to break the security just as an exercise, have fun.

There are a lot of tools but you may not have much luck getting them for the

Windows platform.

 

You had mentioned "totally secure"... it is not going to happen! If your

neighbour has something of value to somebody else, and if that somebody else

has enough desire, that wifi security will be broken or bypassed entirely.

Internal devices like firewalls and such will add addtional securty measures.

Then add in good practices and secure those endpoints! Most of the damage

to a person's network happens right from that person's own computer by their

own hand. One good trojan and that machine is owned... wifi security had

nothing to do with it!

 

If she is just a regular person with a home-based internet connection, the

security you setup should be plenty. Just monitor the wifi logs to see if

other machines try to connect. Turn on MAC authentication for one more layer

of protection. Change the WPA2 key on a regular basis, update the firmware

as needed, and lock down all systems that are used.... unless there is a

threat nearby with a motive against her, what you've done so far should be

plenty to keep her secure. Now, turn your attention to her workstations and

secure them.

 

"Sinbad The Sailor" wrote:

<span style="color:blue">

> Shenan,

>

> Thank you for the reply, and thanks to all others who replied, there is an

> indescribable wealth of knowledge here.

>

> My query was for some sort of instruction to help me use the listed programs

> for penetration testing.

>

> Following your advice, I have changed the security to WPA2 with a 128bit

> passkey.

>

> Now to the penetration testing! Which is the most effective program to

> capture Ivs and see if I can reveal the passkey?

>

> Thanks all.

>

> -Sinbad

>

>

> On 12/01/2009 13:47, in article e7TdhxLdJHA.2400@TK2MSFTNGP03.phx.gbl,

> "Shenan Stanley" <newshelper@gmail.com> wrote:

> <span style="color:green">

> > Wifi SecuritySinbad The Sailor wrote:<span style="color:darkred">

> >> Over the weekend, I have been helping my neighbour

> >> with her wireless internet. It has been set up OK, and

> >> has WEP protection, but I want to be sure that it is

> >> totally secure.

> >>

> >> To make sure, I took it upon myself to collect a few tools

> >> and attempt to break into her wireless internet connection.

> >> The tools in question were popular ones such as AirCrack,

> >> AirSnort, Easy Wifi Radar, etc.

> >>

> >> I want to use them on my laptop, which is an Acer Extensa

> >> 5220 with an Broadcom 802.11g Wireless Adaptor and

> >> using Windows Vista Home Basic SP1.

> >>

> >> I cannot configure the wireless adaptor to work with the

> >> above programs! I attempted to start AeroDump

> >> (to collect Ivs) but couldn't find my adaptor to work with it!

> >> I was attempting to do it via the GUI, not the binaries which

> >> are available.

> >>

> >> I thank you all in advance for any advice given.</span>

> >

> > Not sure what your query is...

> >

> > In any case - "WEP" and "secure" are not two words I would use together.

> > You should change her wireless to WPA2 with a decent length key. If any

> > part of her network cannot do WPA2 but you actually want her network to be

> > secure - upgrade that part of the network so it can do WPA2. (Without

> > hesitation I suggest it above WEP. I suggest it above WPA as well.)

> >

> > As far as running network testing tools - I don't really consider Vista as a

> > platform for such things. ;-)</span>

>

> </span>

Guest Sinbad The Sailor
Posted

Good Afternoon All,

 

Following your advice I got myself a copy of the Backtrack 3 boot CD to use

on my laptop, to try and break the security I made. However the laptop

doesn't attempt to boot off the CD so does this mean I have to mess with the

BIOS settings on my laptop to check for a CD before booting off the HDD?

 

I'm hoping when I can sort this problem, I can keep the settings and

everything so when I work on other people's wifi I can do it all quickly and

easily.

 

Thanks all.

 

-Sinbad

 

 

On 13/01/2009 19:42, in article

2F7EA7C6-CB5A-447C-953F-34F2DDAC31AE@microsoft.com, "E. Cox"

<ECox@discussions.microsoft.com> wrote:

<span style="color:blue">

> Well, if you want to try to break the security just as an exercise, have fun.

> There are a lot of tools but you may not have much luck getting them for the

> Windows platform.

>

> You had mentioned "totally secure"... it is not going to happen! If your

> neighbour has something of value to somebody else, and if that somebody else

> has enough desire, that wifi security will be broken or bypassed entirely.

> Internal devices like firewalls and such will add addtional securty measures.

> Then add in good practices and secure those endpoints! Most of the damage

> to a person's network happens right from that person's own computer by their

> own hand. One good trojan and that machine is owned... wifi security had

> nothing to do with it!

>

> If she is just a regular person with a home-based internet connection, the

> security you setup should be plenty. Just monitor the wifi logs to see if

> other machines try to connect. Turn on MAC authentication for one more layer

> of protection. Change the WPA2 key on a regular basis, update the firmware

> as needed, and lock down all systems that are used.... unless there is a

> threat nearby with a motive against her, what you've done so far should be

> plenty to keep her secure. Now, turn your attention to her workstations and

> secure them.

>

> "Sinbad The Sailor" wrote:

> <span style="color:green">

>> Shenan,

>>

>> Thank you for the reply, and thanks to all others who replied, there is an

>> indescribable wealth of knowledge here.

>>

>> My query was for some sort of instruction to help me use the listed programs

>> for penetration testing.

>>

>> Following your advice, I have changed the security to WPA2 with a 128bit

>> passkey.

>>

>> Now to the penetration testing! Which is the most effective program to

>> capture Ivs and see if I can reveal the passkey?

>>

>> Thanks all.

>>

>> -Sinbad

>>

>>

>> On 12/01/2009 13:47, in article e7TdhxLdJHA.2400@TK2MSFTNGP03.phx.gbl,

>> "Shenan Stanley" <newshelper@gmail.com> wrote:

>> <span style="color:darkred">

>>> Wifi SecuritySinbad The Sailor wrote:

>>>> Over the weekend, I have been helping my neighbour

>>>> with her wireless internet. It has been set up OK, and

>>>> has WEP protection, but I want to be sure that it is

>>>> totally secure.

>>>>

>>>> To make sure, I took it upon myself to collect a few tools

>>>> and attempt to break into her wireless internet connection.

>>>> The tools in question were popular ones such as AirCrack,

>>>> AirSnort, Easy Wifi Radar, etc.

>>>>

>>>> I want to use them on my laptop, which is an Acer Extensa

>>>> 5220 with an Broadcom 802.11g Wireless Adaptor and

>>>> using Windows Vista Home Basic SP1.

>>>>

>>>> I cannot configure the wireless adaptor to work with the

>>>> above programs! I attempted to start AeroDump

>>>> (to collect Ivs) but couldn't find my adaptor to work with it!

>>>> I was attempting to do it via the GUI, not the binaries which

>>>> are available.

>>>>

>>>> I thank you all in advance for any advice given.

>>>

>>> Not sure what your query is...

>>>

>>> In any case - "WEP" and "secure" are not two words I would use together.

>>> You should change her wireless to WPA2 with a decent length key. If any

>>> part of her network cannot do WPA2 but you actually want her network to be

>>> secure - upgrade that part of the network so it can do WPA2. (Without

>>> hesitation I suggest it above WEP. I suggest it above WPA as well.)

>>>

>>> As far as running network testing tools - I don't really consider Vista as a

>>> platform for such things. ;-)</span>

>>

>> </span></span>

Guest FromTheRafters
Posted

Yes, you have to set the option to boot from the live

CD in the CMOS setup program. Are you familiar

with Linux? IIRC Backtrack is a Linux based pen-

test disk.

 

"Sinbad The Sailor" <roliasehtdabnis@sinbadthesailor.net> wrote in message

news:C59A112B.30EF%roliasehtdabnis@sinbadthesailor.net...<span style="color:blue">

> Good Afternoon All,

>

> Following your advice I got myself a copy of the Backtrack 3 boot CD to

> use

> on my laptop, to try and break the security I made. However the laptop

> doesn't attempt to boot off the CD so does this mean I have to mess with

> the

> BIOS settings on my laptop to check for a CD before booting off the HDD?

>

> I'm hoping when I can sort this problem, I can keep the settings and

> everything so when I work on other people's wifi I can do it all quickly

> and

> easily.

>

> Thanks all.

>

> -Sinbad

>

>

> On 13/01/2009 19:42, in article

> 2F7EA7C6-CB5A-447C-953F-34F2DDAC31AE@microsoft.com, "E. Cox"

> <ECox@discussions.microsoft.com> wrote:

><span style="color:green">

>> Well, if you want to try to break the security just as an exercise, have

>> fun.

>> There are a lot of tools but you may not have much luck getting them for

>> the

>> Windows platform.

>>

>> You had mentioned "totally secure"... it is not going to happen! If your

>> neighbour has something of value to somebody else, and if that somebody

>> else

>> has enough desire, that wifi security will be broken or bypassed

>> entirely.

>> Internal devices like firewalls and such will add addtional securty

>> measures.

>> Then add in good practices and secure those endpoints! Most of the

>> damage

>> to a person's network happens right from that person's own computer by

>> their

>> own hand. One good trojan and that machine is owned... wifi security had

>> nothing to do with it!

>>

>> If she is just a regular person with a home-based internet connection,

>> the

>> security you setup should be plenty. Just monitor the wifi logs to see

>> if

>> other machines try to connect. Turn on MAC authentication for one more

>> layer

>> of protection. Change the WPA2 key on a regular basis, update the

>> firmware

>> as needed, and lock down all systems that are used.... unless there is a

>> threat nearby with a motive against her, what you've done so far should

>> be

>> plenty to keep her secure. Now, turn your attention to her workstations

>> and

>> secure them.

>>

>> "Sinbad The Sailor" wrote:

>><span style="color:darkred">

>>> Shenan,

>>>

>>> Thank you for the reply, and thanks to all others who replied, there is

>>> an

>>> indescribable wealth of knowledge here.

>>>

>>> My query was for some sort of instruction to help me use the listed

>>> programs

>>> for penetration testing.

>>>

>>> Following your advice, I have changed the security to WPA2 with a 128bit

>>> passkey.

>>>

>>> Now to the penetration testing! Which is the most effective program to

>>> capture Ivs and see if I can reveal the passkey?

>>>

>>> Thanks all.

>>>

>>> -Sinbad

>>>

>>>

>>> On 12/01/2009 13:47, in article e7TdhxLdJHA.2400@TK2MSFTNGP03.phx.gbl,

>>> "Shenan Stanley" <newshelper@gmail.com> wrote:

>>>

>>>> Wifi SecuritySinbad The Sailor wrote:

>>>>> Over the weekend, I have been helping my neighbour

>>>>> with her wireless internet. It has been set up OK, and

>>>>> has WEP protection, but I want to be sure that it is

>>>>> totally secure.

>>>>>

>>>>> To make sure, I took it upon myself to collect a few tools

>>>>> and attempt to break into her wireless internet connection.

>>>>> The tools in question were popular ones such as AirCrack,

>>>>> AirSnort, Easy Wifi Radar, etc.

>>>>>

>>>>> I want to use them on my laptop, which is an Acer Extensa

>>>>> 5220 with an Broadcom 802.11g Wireless Adaptor and

>>>>> using Windows Vista Home Basic SP1.

>>>>>

>>>>> I cannot configure the wireless adaptor to work with the

>>>>> above programs! I attempted to start AeroDump

>>>>> (to collect Ivs) but couldn't find my adaptor to work with it!

>>>>> I was attempting to do it via the GUI, not the binaries which

>>>>> are available.

>>>>>

>>>>> I thank you all in advance for any advice given.

>>>>

>>>> Not sure what your query is...

>>>>

>>>> In any case - "WEP" and "secure" are not two words I would use

>>>> together.

>>>> You should change her wireless to WPA2 with a decent length key. If

>>>> any

>>>> part of her network cannot do WPA2 but you actually want her network to

>>>> be

>>>> secure - upgrade that part of the network so it can do WPA2. (Without

>>>> hesitation I suggest it above WEP. I suggest it above WPA as well.)

>>>>

>>>> As far as running network testing tools - I don't really consider Vista

>>>> as a

>>>> platform for such things. ;-)

>>>

>>></span></span>

> </span>

Guest Sinbad The Sailor
Posted

Hello FromTheRafters,

 

Yes, I have used Knoppix many times, mostly just to recover stuff when

Windows fails. Is there any major differences I know about?

 

Will a Broadcom 802.11b Wireless adaptor be compatible with the penetration

programs that comes with BackTrack 3?

 

Thanks a lot.

 

-Sinbad

 

 

On 19/01/2009 21:25, in article OuDjuxneJHA.5420@TK2MSFTNGP02.phx.gbl,

"FromTheRafters" <erratic@nomail.afraid.org> wrote:

<span style="color:blue">

> Yes, you have to set the option to boot from the live

> CD in the CMOS setup program. Are you familiar

> with Linux? IIRC Backtrack is a Linux based pen-

> test disk.

>

> "Sinbad The Sailor" <roliasehtdabnis@sinbadthesailor.net> wrote in message

> news:C59A112B.30EF%roliasehtdabnis@sinbadthesailor.net...<span style="color:green">

>> Good Afternoon All,

>>

>> Following your advice I got myself a copy of the Backtrack 3 boot CD to

>> use

>> on my laptop, to try and break the security I made. However the laptop

>> doesn't attempt to boot off the CD so does this mean I have to mess with

>> the

>> BIOS settings on my laptop to check for a CD before booting off the HDD?

>>

>> I'm hoping when I can sort this problem, I can keep the settings and

>> everything so when I work on other people's wifi I can do it all quickly

>> and

>> easily.

>>

>> Thanks all.

>>

>> -Sinbad

>>

>>

>> On 13/01/2009 19:42, in article

>> 2F7EA7C6-CB5A-447C-953F-34F2DDAC31AE@microsoft.com, "E. Cox"

>> <ECox@discussions.microsoft.com> wrote:

>> <span style="color:darkred">

>>> Well, if you want to try to break the security just as an exercise, have

>>> fun.

>>> There are a lot of tools but you may not have much luck getting them for

>>> the

>>> Windows platform.

>>>

>>> You had mentioned "totally secure"... it is not going to happen! If your

>>> neighbour has something of value to somebody else, and if that somebody

>>> else

>>> has enough desire, that wifi security will be broken or bypassed

>>> entirely.

>>> Internal devices like firewalls and such will add addtional securty

>>> measures.

>>> Then add in good practices and secure those endpoints! Most of the

>>> damage

>>> to a person's network happens right from that person's own computer by

>>> their

>>> own hand. One good trojan and that machine is owned... wifi security had

>>> nothing to do with it!

>>>

>>> If she is just a regular person with a home-based internet connection,

>>> the

>>> security you setup should be plenty. Just monitor the wifi logs to see

>>> if

>>> other machines try to connect. Turn on MAC authentication for one more

>>> layer

>>> of protection. Change the WPA2 key on a regular basis, update the

>>> firmware

>>> as needed, and lock down all systems that are used.... unless there is a

>>> threat nearby with a motive against her, what you've done so far should

>>> be

>>> plenty to keep her secure. Now, turn your attention to her workstations

>>> and

>>> secure them.

>>>

>>> "Sinbad The Sailor" wrote:

>>>

>>>> Shenan,

>>>>

>>>> Thank you for the reply, and thanks to all others who replied, there is

>>>> an

>>>> indescribable wealth of knowledge here.

>>>>

>>>> My query was for some sort of instruction to help me use the listed

>>>> programs

>>>> for penetration testing.

>>>>

>>>> Following your advice, I have changed the security to WPA2 with a 128bit

>>>> passkey.

>>>>

>>>> Now to the penetration testing! Which is the most effective program to

>>>> capture Ivs and see if I can reveal the passkey?

>>>>

>>>> Thanks all.

>>>>

>>>> -Sinbad

>>>>

>>>>

>>>> On 12/01/2009 13:47, in article e7TdhxLdJHA.2400@TK2MSFTNGP03.phx.gbl,

>>>> "Shenan Stanley" <newshelper@gmail.com> wrote:

>>>>

>>>>> Wifi SecuritySinbad The Sailor wrote:

>>>>>> Over the weekend, I have been helping my neighbour

>>>>>> with her wireless internet. It has been set up OK, and

>>>>>> has WEP protection, but I want to be sure that it is

>>>>>> totally secure.

>>>>>>

>>>>>> To make sure, I took it upon myself to collect a few tools

>>>>>> and attempt to break into her wireless internet connection.

>>>>>> The tools in question were popular ones such as AirCrack,

>>>>>> AirSnort, Easy Wifi Radar, etc.

>>>>>>

>>>>>> I want to use them on my laptop, which is an Acer Extensa

>>>>>> 5220 with an Broadcom 802.11g Wireless Adaptor and

>>>>>> using Windows Vista Home Basic SP1.

>>>>>>

>>>>>> I cannot configure the wireless adaptor to work with the

>>>>>> above programs! I attempted to start AeroDump

>>>>>> (to collect Ivs) but couldn't find my adaptor to work with it!

>>>>>> I was attempting to do it via the GUI, not the binaries which

>>>>>> are available.

>>>>>>

>>>>>> I thank you all in advance for any advice given.

>>>>>

>>>>> Not sure what your query is...

>>>>>

>>>>> In any case - "WEP" and "secure" are not two words I would use

>>>>> together.

>>>>> You should change her wireless to WPA2 with a decent length key. If

>>>>> any

>>>>> part of her network cannot do WPA2 but you actually want her network to

>>>>> be

>>>>> secure - upgrade that part of the network so it can do WPA2. (Without

>>>>> hesitation I suggest it above WEP. I suggest it above WPA as well.)

>>>>>

>>>>> As far as running network testing tools - I don't really consider Vista

>>>>> as a

>>>>> platform for such things. ;-)

>>>>

>>>> </span>

>> </span>

>

> </span>

Guest David Carrasco
Posted

I'd recommend you to go to the program's wiki site:

 

http://wiki.remote-exploit.org/index.php/Main_Page

 

Best,

 

--

 

David C.

Microsoft Certified Trainer

http://www.heroescertificados.com

 

 

"Sinbad The Sailor" <roliasehtdabnis@sinbadthesailor.net> escribió en el

mensaje de noticias:C59B3EFE.3177%roliasehtdabnis@sinbadthesailor.net...<span style="color:blue">

> Hello FromTheRafters,

>

> Yes, I have used Knoppix many times, mostly just to recover stuff when

> Windows fails. Is there any major differences I know about?

>

> Will a Broadcom 802.11b Wireless adaptor be compatible with the

> penetration

> programs that comes with BackTrack 3?

>

> Thanks a lot.

>

> -Sinbad

>

>

> On 19/01/2009 21:25, in article OuDjuxneJHA.5420@TK2MSFTNGP02.phx.gbl,

> "FromTheRafters" <erratic@nomail.afraid.org> wrote:

><span style="color:green">

>> Yes, you have to set the option to boot from the live

>> CD in the CMOS setup program. Are you familiar

>> with Linux? IIRC Backtrack is a Linux based pen-

>> test disk.

>>

>> "Sinbad The Sailor" <roliasehtdabnis@sinbadthesailor.net> wrote in

>> message

>> news:C59A112B.30EF%roliasehtdabnis@sinbadthesailor.net...<span style="color:darkred">

>>> Good Afternoon All,

>>>

>>> Following your advice I got myself a copy of the Backtrack 3 boot CD to

>>> use

>>> on my laptop, to try and break the security I made. However the laptop

>>> doesn't attempt to boot off the CD so does this mean I have to mess with

>>> the

>>> BIOS settings on my laptop to check for a CD before booting off the HDD?

>>>

>>> I'm hoping when I can sort this problem, I can keep the settings and

>>> everything so when I work on other people's wifi I can do it all quickly

>>> and

>>> easily.

>>>

>>> Thanks all.

>>>

>>> -Sinbad

>>>

>>>

>>> On 13/01/2009 19:42, in article

>>> 2F7EA7C6-CB5A-447C-953F-34F2DDAC31AE@microsoft.com, "E. Cox"

>>> <ECox@discussions.microsoft.com> wrote:

>>>

>>>> Well, if you want to try to break the security just as an exercise,

>>>> have

>>>> fun.

>>>> There are a lot of tools but you may not have much luck getting them

>>>> for

>>>> the

>>>> Windows platform.

>>>>

>>>> You had mentioned "totally secure"... it is not going to happen! If

>>>> your

>>>> neighbour has something of value to somebody else, and if that somebody

>>>> else

>>>> has enough desire, that wifi security will be broken or bypassed

>>>> entirely.

>>>> Internal devices like firewalls and such will add addtional securty

>>>> measures.

>>>> Then add in good practices and secure those endpoints! Most of the

>>>> damage

>>>> to a person's network happens right from that person's own computer by

>>>> their

>>>> own hand. One good trojan and that machine is owned... wifi security

>>>> had

>>>> nothing to do with it!

>>>>

>>>> If she is just a regular person with a home-based internet connection,

>>>> the

>>>> security you setup should be plenty. Just monitor the wifi logs to see

>>>> if

>>>> other machines try to connect. Turn on MAC authentication for one more

>>>> layer

>>>> of protection. Change the WPA2 key on a regular basis, update the

>>>> firmware

>>>> as needed, and lock down all systems that are used.... unless there is

>>>> a

>>>> threat nearby with a motive against her, what you've done so far should

>>>> be

>>>> plenty to keep her secure. Now, turn your attention to her

>>>> workstations

>>>> and

>>>> secure them.

>>>>

>>>> "Sinbad The Sailor" wrote:

>>>>

>>>>> Shenan,

>>>>>

>>>>> Thank you for the reply, and thanks to all others who replied, there

>>>>> is

>>>>> an

>>>>> indescribable wealth of knowledge here.

>>>>>

>>>>> My query was for some sort of instruction to help me use the listed

>>>>> programs

>>>>> for penetration testing.

>>>>>

>>>>> Following your advice, I have changed the security to WPA2 with a

>>>>> 128bit

>>>>> passkey.

>>>>>

>>>>> Now to the penetration testing! Which is the most effective program to

>>>>> capture Ivs and see if I can reveal the passkey?

>>>>>

>>>>> Thanks all.

>>>>>

>>>>> -Sinbad

>>>>>

>>>>>

>>>>> On 12/01/2009 13:47, in article e7TdhxLdJHA.2400@TK2MSFTNGP03.phx.gbl,

>>>>> "Shenan Stanley" <newshelper@gmail.com> wrote:

>>>>>

>>>>>> Wifi SecuritySinbad The Sailor wrote:

>>>>>>> Over the weekend, I have been helping my neighbour

>>>>>>> with her wireless internet. It has been set up OK, and

>>>>>>> has WEP protection, but I want to be sure that it is

>>>>>>> totally secure.

>>>>>>>

>>>>>>> To make sure, I took it upon myself to collect a few tools

>>>>>>> and attempt to break into her wireless internet connection.

>>>>>>> The tools in question were popular ones such as AirCrack,

>>>>>>> AirSnort, Easy Wifi Radar, etc.

>>>>>>>

>>>>>>> I want to use them on my laptop, which is an Acer Extensa

>>>>>>> 5220 with an Broadcom 802.11g Wireless Adaptor and

>>>>>>> using Windows Vista Home Basic SP1.

>>>>>>>

>>>>>>> I cannot configure the wireless adaptor to work with the

>>>>>>> above programs! I attempted to start AeroDump

>>>>>>> (to collect Ivs) but couldn't find my adaptor to work with it!

>>>>>>> I was attempting to do it via the GUI, not the binaries which

>>>>>>> are available.

>>>>>>>

>>>>>>> I thank you all in advance for any advice given.

>>>>>>

>>>>>> Not sure what your query is...

>>>>>>

>>>>>> In any case - "WEP" and "secure" are not two words I would use

>>>>>> together.

>>>>>> You should change her wireless to WPA2 with a decent length key. If

>>>>>> any

>>>>>> part of her network cannot do WPA2 but you actually want her network

>>>>>> to

>>>>>> be

>>>>>> secure - upgrade that part of the network so it can do WPA2.

>>>>>> (Without

>>>>>> hesitation I suggest it above WEP. I suggest it above WPA as well.)

>>>>>>

>>>>>> As far as running network testing tools - I don't really consider

>>>>>> Vista

>>>>>> as a

>>>>>> platform for such things. ;-)

>>>>>

>>>>>

>>></span>

>>

>></span>

> </span>

Guest FromTheRafters
Posted

No, I was just thrown off by your having to ask about how

to boot from a live CD. GUI's are easy no matter what the

OS, but when you have to use the command line for Linux

- and you are unfamiliar with it - it can be problematic.

 

Check out the wiki for it as David Carrasco suggests in his post,

they have hardware compatibility listings and such there.

 

"Sinbad The Sailor" <roliasehtdabnis@sinbadthesailor.net> wrote in message

news:C59B3EFE.3177%roliasehtdabnis@sinbadthesailor.net...<span style="color:blue">

> Hello FromTheRafters,

>

> Yes, I have used Knoppix many times, mostly just to recover stuff when

> Windows fails. Is there any major differences I know about?

>

> Will a Broadcom 802.11b Wireless adaptor be compatible with the

> penetration

> programs that comes with BackTrack 3?

>

> Thanks a lot.

>

> -Sinbad

>

>

> On 19/01/2009 21:25, in article OuDjuxneJHA.5420@TK2MSFTNGP02.phx.gbl,

> "FromTheRafters" <erratic@nomail.afraid.org> wrote:

><span style="color:green">

>> Yes, you have to set the option to boot from the live

>> CD in the CMOS setup program. Are you familiar

>> with Linux? IIRC Backtrack is a Linux based pen-

>> test disk.

>>

>> "Sinbad The Sailor" <roliasehtdabnis@sinbadthesailor.net> wrote in

>> message

>> news:C59A112B.30EF%roliasehtdabnis@sinbadthesailor.net...<span style="color:darkred">

>>> Good Afternoon All,

>>>

>>> Following your advice I got myself a copy of the Backtrack 3 boot CD to

>>> use

>>> on my laptop, to try and break the security I made. However the laptop

>>> doesn't attempt to boot off the CD so does this mean I have to mess with

>>> the

>>> BIOS settings on my laptop to check for a CD before booting off the HDD?

>>>

>>> I'm hoping when I can sort this problem, I can keep the settings and

>>> everything so when I work on other people's wifi I can do it all quickly

>>> and

>>> easily.

>>>

>>> Thanks all.

>>>

>>> -Sinbad

>>>

>>>

>>> On 13/01/2009 19:42, in article

>>> 2F7EA7C6-CB5A-447C-953F-34F2DDAC31AE@microsoft.com, "E. Cox"

>>> <ECox@discussions.microsoft.com> wrote:

>>>

>>>> Well, if you want to try to break the security just as an exercise,

>>>> have

>>>> fun.

>>>> There are a lot of tools but you may not have much luck getting them

>>>> for

>>>> the

>>>> Windows platform.

>>>>

>>>> You had mentioned "totally secure"... it is not going to happen! If

>>>> your

>>>> neighbour has something of value to somebody else, and if that somebody

>>>> else

>>>> has enough desire, that wifi security will be broken or bypassed

>>>> entirely.

>>>> Internal devices like firewalls and such will add addtional securty

>>>> measures.

>>>> Then add in good practices and secure those endpoints! Most of the

>>>> damage

>>>> to a person's network happens right from that person's own computer by

>>>> their

>>>> own hand. One good trojan and that machine is owned... wifi security

>>>> had

>>>> nothing to do with it!

>>>>

>>>> If she is just a regular person with a home-based internet connection,

>>>> the

>>>> security you setup should be plenty. Just monitor the wifi logs to see

>>>> if

>>>> other machines try to connect. Turn on MAC authentication for one more

>>>> layer

>>>> of protection. Change the WPA2 key on a regular basis, update the

>>>> firmware

>>>> as needed, and lock down all systems that are used.... unless there is

>>>> a

>>>> threat nearby with a motive against her, what you've done so far should

>>>> be

>>>> plenty to keep her secure. Now, turn your attention to her

>>>> workstations

>>>> and

>>>> secure them.

>>>>

>>>> "Sinbad The Sailor" wrote:

>>>>

>>>>> Shenan,

>>>>>

>>>>> Thank you for the reply, and thanks to all others who replied, there

>>>>> is

>>>>> an

>>>>> indescribable wealth of knowledge here.

>>>>>

>>>>> My query was for some sort of instruction to help me use the listed

>>>>> programs

>>>>> for penetration testing.

>>>>>

>>>>> Following your advice, I have changed the security to WPA2 with a

>>>>> 128bit

>>>>> passkey.

>>>>>

>>>>> Now to the penetration testing! Which is the most effective program to

>>>>> capture Ivs and see if I can reveal the passkey?

>>>>>

>>>>> Thanks all.

>>>>>

>>>>> -Sinbad

>>>>>

>>>>>

>>>>> On 12/01/2009 13:47, in article e7TdhxLdJHA.2400@TK2MSFTNGP03.phx.gbl,

>>>>> "Shenan Stanley" <newshelper@gmail.com> wrote:

>>>>>

>>>>>> Wifi SecuritySinbad The Sailor wrote:

>>>>>>> Over the weekend, I have been helping my neighbour

>>>>>>> with her wireless internet. It has been set up OK, and

>>>>>>> has WEP protection, but I want to be sure that it is

>>>>>>> totally secure.

>>>>>>>

>>>>>>> To make sure, I took it upon myself to collect a few tools

>>>>>>> and attempt to break into her wireless internet connection.

>>>>>>> The tools in question were popular ones such as AirCrack,

>>>>>>> AirSnort, Easy Wifi Radar, etc.

>>>>>>>

>>>>>>> I want to use them on my laptop, which is an Acer Extensa

>>>>>>> 5220 with an Broadcom 802.11g Wireless Adaptor and

>>>>>>> using Windows Vista Home Basic SP1.

>>>>>>>

>>>>>>> I cannot configure the wireless adaptor to work with the

>>>>>>> above programs! I attempted to start AeroDump

>>>>>>> (to collect Ivs) but couldn't find my adaptor to work with it!

>>>>>>> I was attempting to do it via the GUI, not the binaries which

>>>>>>> are available.

>>>>>>>

>>>>>>> I thank you all in advance for any advice given.

>>>>>>

>>>>>> Not sure what your query is...

>>>>>>

>>>>>> In any case - "WEP" and "secure" are not two words I would use

>>>>>> together.

>>>>>> You should change her wireless to WPA2 with a decent length key. If

>>>>>> any

>>>>>> part of her network cannot do WPA2 but you actually want her network

>>>>>> to

>>>>>> be

>>>>>> secure - upgrade that part of the network so it can do WPA2.

>>>>>> (Without

>>>>>> hesitation I suggest it above WEP. I suggest it above WPA as well.)

>>>>>>

>>>>>> As far as running network testing tools - I don't really consider

>>>>>> Vista

>>>>>> as a

>>>>>> platform for such things. ;-)

>>>>>

>>>>>

>>></span>

>>

>></span>

> </span>

Guest Sinbad The Sailor
Posted

Hello All,

 

I followed your advice and checked the wiki site for compatability issues...

However, I could find neither my laptop or wireless card, and there was no

'If your hardware is not listed here' line... Should I go right ahead and

try it out or are there risks to take into account first?

 

Thanks.

 

Sinbad

 

 

On 21/01/2009 02:08, in article O2HBn02eJHA.1292@TK2MSFTNGP02.phx.gbl,

"FromTheRafters" <erratic@nomail.afraid.org> wrote:

<span style="color:blue">

> No, I was just thrown off by your having to ask about how

> to boot from a live CD. GUI's are easy no matter what the

> OS, but when you have to use the command line for Linux

> - and you are unfamiliar with it - it can be problematic.

>

> Check out the wiki for it as David Carrasco suggests in his post,

> they have hardware compatibility listings and such there.

>

> "Sinbad The Sailor" <roliasehtdabnis@sinbadthesailor.net> wrote in message

> news:C59B3EFE.3177%roliasehtdabnis@sinbadthesailor.net...<span style="color:green">

>> Hello FromTheRafters,

>>

>> Yes, I have used Knoppix many times, mostly just to recover stuff when

>> Windows fails. Is there any major differences I know about?

>>

>> Will a Broadcom 802.11b Wireless adaptor be compatible with the

>> penetration

>> programs that comes with BackTrack 3?

>>

>> Thanks a lot.

>>

>> -Sinbad

>>

>>

>> On 19/01/2009 21:25, in article OuDjuxneJHA.5420@TK2MSFTNGP02.phx.gbl,

>> "FromTheRafters" <erratic@nomail.afraid.org> wrote:

>> <span style="color:darkred">

>>> Yes, you have to set the option to boot from the live

>>> CD in the CMOS setup program. Are you familiar

>>> with Linux? IIRC Backtrack is a Linux based pen-

>>> test disk.

>>>

>>> "Sinbad The Sailor" <roliasehtdabnis@sinbadthesailor.net> wrote in

>>> message

>>> news:C59A112B.30EF%roliasehtdabnis@sinbadthesailor.net...

>>>> Good Afternoon All,

>>>>

>>>> Following your advice I got myself a copy of the Backtrack 3 boot CD to

>>>> use

>>>> on my laptop, to try and break the security I made. However the laptop

>>>> doesn't attempt to boot off the CD so does this mean I have to mess with

>>>> the

>>>> BIOS settings on my laptop to check for a CD before booting off the HDD?

>>>>

>>>> I'm hoping when I can sort this problem, I can keep the settings and

>>>> everything so when I work on other people's wifi I can do it all quickly

>>>> and

>>>> easily.

>>>>

>>>> Thanks all.

>>>>

>>>> -Sinbad

>>>>

>>>>

>>>> On 13/01/2009 19:42, in article

>>>> 2F7EA7C6-CB5A-447C-953F-34F2DDAC31AE@microsoft.com, "E. Cox"

>>>> <ECox@discussions.microsoft.com> wrote:

>>>>

>>>>> Well, if you want to try to break the security just as an exercise,

>>>>> have

>>>>> fun.

>>>>> There are a lot of tools but you may not have much luck getting them

>>>>> for

>>>>> the

>>>>> Windows platform.

>>>>>

>>>>> You had mentioned "totally secure"... it is not going to happen! If

>>>>> your

>>>>> neighbour has something of value to somebody else, and if that somebody

>>>>> else

>>>>> has enough desire, that wifi security will be broken or bypassed

>>>>> entirely.

>>>>> Internal devices like firewalls and such will add addtional securty

>>>>> measures.

>>>>> Then add in good practices and secure those endpoints! Most of the

>>>>> damage

>>>>> to a person's network happens right from that person's own computer by

>>>>> their

>>>>> own hand. One good trojan and that machine is owned... wifi security

>>>>> had

>>>>> nothing to do with it!

>>>>>

>>>>> If she is just a regular person with a home-based internet connection,

>>>>> the

>>>>> security you setup should be plenty. Just monitor the wifi logs to see

>>>>> if

>>>>> other machines try to connect. Turn on MAC authentication for one more

>>>>> layer

>>>>> of protection. Change the WPA2 key on a regular basis, update the

>>>>> firmware

>>>>> as needed, and lock down all systems that are used.... unless there is

>>>>> a

>>>>> threat nearby with a motive against her, what you've done so far should

>>>>> be

>>>>> plenty to keep her secure. Now, turn your attention to her

>>>>> workstations

>>>>> and

>>>>> secure them.

>>>>>

>>>>> "Sinbad The Sailor" wrote:

>>>>>

>>>>>> Shenan,

>>>>>>

>>>>>> Thank you for the reply, and thanks to all others who replied, there

>>>>>> is

>>>>>> an

>>>>>> indescribable wealth of knowledge here.

>>>>>>

>>>>>> My query was for some sort of instruction to help me use the listed

>>>>>> programs

>>>>>> for penetration testing.

>>>>>>

>>>>>> Following your advice, I have changed the security to WPA2 with a

>>>>>> 128bit

>>>>>> passkey.

>>>>>>

>>>>>> Now to the penetration testing! Which is the most effective program to

>>>>>> capture Ivs and see if I can reveal the passkey?

>>>>>>

>>>>>> Thanks all.

>>>>>>

>>>>>> -Sinbad

>>>>>>

>>>>>>

>>>>>> On 12/01/2009 13:47, in article e7TdhxLdJHA.2400@TK2MSFTNGP03.phx.gbl,

>>>>>> "Shenan Stanley" <newshelper@gmail.com> wrote:

>>>>>>

>>>>>>> Wifi SecuritySinbad The Sailor wrote:

>>>>>>>> Over the weekend, I have been helping my neighbour

>>>>>>>> with her wireless internet. It has been set up OK, and

>>>>>>>> has WEP protection, but I want to be sure that it is

>>>>>>>> totally secure.

>>>>>>>>

>>>>>>>> To make sure, I took it upon myself to collect a few tools

>>>>>>>> and attempt to break into her wireless internet connection.

>>>>>>>> The tools in question were popular ones such as AirCrack,

>>>>>>>> AirSnort, Easy Wifi Radar, etc.

>>>>>>>>

>>>>>>>> I want to use them on my laptop, which is an Acer Extensa

>>>>>>>> 5220 with an Broadcom 802.11g Wireless Adaptor and

>>>>>>>> using Windows Vista Home Basic SP1.

>>>>>>>>

>>>>>>>> I cannot configure the wireless adaptor to work with the

>>>>>>>> above programs! I attempted to start AeroDump

>>>>>>>> (to collect Ivs) but couldn't find my adaptor to work with it!

>>>>>>>> I was attempting to do it via the GUI, not the binaries which

>>>>>>>> are available.

>>>>>>>>

>>>>>>>> I thank you all in advance for any advice given.

>>>>>>>

>>>>>>> Not sure what your query is...

>>>>>>>

>>>>>>> In any case - "WEP" and "secure" are not two words I would use

>>>>>>> together.

>>>>>>> You should change her wireless to WPA2 with a decent length key. If

>>>>>>> any

>>>>>>> part of her network cannot do WPA2 but you actually want her network

>>>>>>> to

>>>>>>> be

>>>>>>> secure - upgrade that part of the network so it can do WPA2.

>>>>>>> (Without

>>>>>>> hesitation I suggest it above WEP. I suggest it above WPA as well.)

>>>>>>>

>>>>>>> As far as running network testing tools - I don't really consider

>>>>>>> Vista

>>>>>>> as a

>>>>>>> platform for such things. ;-)

>>>>>>

>>>>>>

>>>>

>>>

>>> </span>

>> </span>

>

> </span>

Guest FromTheRafters
Posted

Why not?

 

The risks? If you have permission to hack into (crack) someone

elses network, that is one thing - but if you are getting in to a

hostile network, remember that you are running as root by default.

 

"Sinbad The Sailor" <roliasehtdabnis@sinbadthesailor.net> wrote in message

news:C59E1800.3297%roliasehtdabnis@sinbadthesailor.net...<span style="color:blue">

> Hello All,

>

> I followed your advice and checked the wiki site for compatability

> issues...

> However, I could find neither my laptop or wireless card, and there was no

> 'If your hardware is not listed here' line... Should I go right ahead and

> try it out or are there risks to take into account first?

>

> Thanks.

>

> Sinbad

>

>

> On 21/01/2009 02:08, in article O2HBn02eJHA.1292@TK2MSFTNGP02.phx.gbl,

> "FromTheRafters" <erratic@nomail.afraid.org> wrote:

><span style="color:green">

>> No, I was just thrown off by your having to ask about how

>> to boot from a live CD. GUI's are easy no matter what the

>> OS, but when you have to use the command line for Linux

>> - and you are unfamiliar with it - it can be problematic.

>>

>> Check out the wiki for it as David Carrasco suggests in his post,

>> they have hardware compatibility listings and such there.

>>

>> "Sinbad The Sailor" <roliasehtdabnis@sinbadthesailor.net> wrote in

>> message

>> news:C59B3EFE.3177%roliasehtdabnis@sinbadthesailor.net...<span style="color:darkred">

>>> Hello FromTheRafters,

>>>

>>> Yes, I have used Knoppix many times, mostly just to recover stuff when

>>> Windows fails. Is there any major differences I know about?

>>>

>>> Will a Broadcom 802.11b Wireless adaptor be compatible with the

>>> penetration

>>> programs that comes with BackTrack 3?

>>>

>>> Thanks a lot.

>>>

>>> -Sinbad

>>>

>>>

>>> On 19/01/2009 21:25, in article OuDjuxneJHA.5420@TK2MSFTNGP02.phx.gbl,

>>> "FromTheRafters" <erratic@nomail.afraid.org> wrote:

>>>

>>>> Yes, you have to set the option to boot from the live

>>>> CD in the CMOS setup program. Are you familiar

>>>> with Linux? IIRC Backtrack is a Linux based pen-

>>>> test disk.

>>>>

>>>> "Sinbad The Sailor" <roliasehtdabnis@sinbadthesailor.net> wrote in

>>>> message

>>>> news:C59A112B.30EF%roliasehtdabnis@sinbadthesailor.net...

>>>>> Good Afternoon All,

>>>>>

>>>>> Following your advice I got myself a copy of the Backtrack 3 boot CD

>>>>> to

>>>>> use

>>>>> on my laptop, to try and break the security I made. However the laptop

>>>>> doesn't attempt to boot off the CD so does this mean I have to mess

>>>>> with

>>>>> the

>>>>> BIOS settings on my laptop to check for a CD before booting off the

>>>>> HDD?

>>>>>

>>>>> I'm hoping when I can sort this problem, I can keep the settings and

>>>>> everything so when I work on other people's wifi I can do it all

>>>>> quickly

>>>>> and

>>>>> easily.

>>>>>

>>>>> Thanks all.

>>>>>

>>>>> -Sinbad

>>>>>

>>>>>

>>>>> On 13/01/2009 19:42, in article

>>>>> 2F7EA7C6-CB5A-447C-953F-34F2DDAC31AE@microsoft.com, "E. Cox"

>>>>> <ECox@discussions.microsoft.com> wrote:

>>>>>

>>>>>> Well, if you want to try to break the security just as an exercise,

>>>>>> have

>>>>>> fun.

>>>>>> There are a lot of tools but you may not have much luck getting them

>>>>>> for

>>>>>> the

>>>>>> Windows platform.

>>>>>>

>>>>>> You had mentioned "totally secure"... it is not going to happen! If

>>>>>> your

>>>>>> neighbour has something of value to somebody else, and if that

>>>>>> somebody

>>>>>> else

>>>>>> has enough desire, that wifi security will be broken or bypassed

>>>>>> entirely.

>>>>>> Internal devices like firewalls and such will add addtional securty

>>>>>> measures.

>>>>>> Then add in good practices and secure those endpoints! Most of the

>>>>>> damage

>>>>>> to a person's network happens right from that person's own computer

>>>>>> by

>>>>>> their

>>>>>> own hand. One good trojan and that machine is owned... wifi security

>>>>>> had

>>>>>> nothing to do with it!

>>>>>>

>>>>>> If she is just a regular person with a home-based internet

>>>>>> connection,

>>>>>> the

>>>>>> security you setup should be plenty. Just monitor the wifi logs to

>>>>>> see

>>>>>> if

>>>>>> other machines try to connect. Turn on MAC authentication for one

>>>>>> more

>>>>>> layer

>>>>>> of protection. Change the WPA2 key on a regular basis, update the

>>>>>> firmware

>>>>>> as needed, and lock down all systems that are used.... unless there

>>>>>> is

>>>>>> a

>>>>>> threat nearby with a motive against her, what you've done so far

>>>>>> should

>>>>>> be

>>>>>> plenty to keep her secure. Now, turn your attention to her

>>>>>> workstations

>>>>>> and

>>>>>> secure them.

>>>>>>

>>>>>> "Sinbad The Sailor" wrote:

>>>>>>

>>>>>>> Shenan,

>>>>>>>

>>>>>>> Thank you for the reply, and thanks to all others who replied, there

>>>>>>> is

>>>>>>> an

>>>>>>> indescribable wealth of knowledge here.

>>>>>>>

>>>>>>> My query was for some sort of instruction to help me use the listed

>>>>>>> programs

>>>>>>> for penetration testing.

>>>>>>>

>>>>>>> Following your advice, I have changed the security to WPA2 with a

>>>>>>> 128bit

>>>>>>> passkey.

>>>>>>>

>>>>>>> Now to the penetration testing! Which is the most effective program

>>>>>>> to

>>>>>>> capture Ivs and see if I can reveal the passkey?

>>>>>>>

>>>>>>> Thanks all.

>>>>>>>

>>>>>>> -Sinbad

>>>>>>>

>>>>>>>

>>>>>>> On 12/01/2009 13:47, in article

>>>>>>> e7TdhxLdJHA.2400@TK2MSFTNGP03.phx.gbl,

>>>>>>> "Shenan Stanley" <newshelper@gmail.com> wrote:

>>>>>>>

>>>>>>>> Wifi SecuritySinbad The Sailor wrote:

>>>>>>>>> Over the weekend, I have been helping my neighbour

>>>>>>>>> with her wireless internet. It has been set up OK, and

>>>>>>>>> has WEP protection, but I want to be sure that it is

>>>>>>>>> totally secure.

>>>>>>>>>

>>>>>>>>> To make sure, I took it upon myself to collect a few tools

>>>>>>>>> and attempt to break into her wireless internet connection.

>>>>>>>>> The tools in question were popular ones such as AirCrack,

>>>>>>>>> AirSnort, Easy Wifi Radar, etc.

>>>>>>>>>

>>>>>>>>> I want to use them on my laptop, which is an Acer Extensa

>>>>>>>>> 5220 with an Broadcom 802.11g Wireless Adaptor and

>>>>>>>>> using Windows Vista Home Basic SP1.

>>>>>>>>>

>>>>>>>>> I cannot configure the wireless adaptor to work with the

>>>>>>>>> above programs! I attempted to start AeroDump

>>>>>>>>> (to collect Ivs) but couldn't find my adaptor to work with it!

>>>>>>>>> I was attempting to do it via the GUI, not the binaries which

>>>>>>>>> are available.

>>>>>>>>>

>>>>>>>>> I thank you all in advance for any advice given.

>>>>>>>>

>>>>>>>> Not sure what your query is...

>>>>>>>>

>>>>>>>> In any case - "WEP" and "secure" are not two words I would use

>>>>>>>> together.

>>>>>>>> You should change her wireless to WPA2 with a decent length key.

>>>>>>>> If

>>>>>>>> any

>>>>>>>> part of her network cannot do WPA2 but you actually want her

>>>>>>>> network

>>>>>>>> to

>>>>>>>> be

>>>>>>>> secure - upgrade that part of the network so it can do WPA2.

>>>>>>>> (Without

>>>>>>>> hesitation I suggest it above WEP. I suggest it above WPA as

>>>>>>>> well.)

>>>>>>>>

>>>>>>>> As far as running network testing tools - I don't really consider

>>>>>>>> Vista

>>>>>>>> as a

>>>>>>>> platform for such things. ;-)

>>>>>>>

>>>>>>>

>>>>>

>>>>

>>>>

>>></span>

>>

>></span>

> </span>

  • 2 weeks later...
Guest Swamp Thing
Posted

When I setup my WIFI network this is what I did to bolt it down.

 

1. Changed the default SSID and in the new name used special & capital

letters, symbols and numbers.

 

2. Turned off SSID broadcasting

 

3. Cloak SSID

 

4. Enabled MAC filtering

 

5. Disabled Open Key & shared key authentication

 

6. Enabled WPA with AES encryption with a 12char password using lower &

upper case letters, numbers and symbols.

 

7. Disabled DHCP and have all work station IP addresses static.

 

8. Enabled firewall on my router and on all workstations

 

If someone can get through all of this then they can have whatever is

on my network.

 

Also this can be found in a NSA document regarding WIFI security.

http://www.nsa.gov/ia/_files/wireless/I332-008R-2005.pdf

 

however the problem with a setup like this is when you are trying to

add a node to the network or if you have guest and they want to get

online with their laptop and you don't like outside nodes on the

network....

 

 

--

Swamp Thing

------------------------------------------------------------------------

Swamp Thing's Profile: http://forums.techarena.in/members/swamp-thing.htm

View this thread: http://forums.techarena.in/microsoft-security/1102175.htm

 

http://forums.techarena.in

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...