Guest Sinbad The Sailor Posted January 12, 2009 Posted January 12, 2009 Good Morning All. Over the weekend, I have been helping my neighbour with her wireless internet. It has been set up OK, and has WEP protection, but I want to be sure that it is totally secure. To make sure, I took it upon myself to collect a few tools and attempt to break into her wireless internet connection. The tools in question were popular ones such as AirCrack, AirSnort, Easy Wifi Radar, etc. I want to use them on my laptop, which is an Acer Extensa 5220 with an Broadcom 802.11g Wireless Adaptor and using Windows Vista Home Basic SP1. I cannot configure the wireless adaptor to work with the above programs! I attempted to start AeroDump (to collect Ivs) but couldn¹t find my adaptor to work with it! I was attempting to do it via the GUI, not the binaries which are available. I thank you all in advance for any advice given. -Sinbad Quote
Guest Martin Potestas Posted January 12, 2009 Posted January 12, 2009 Sinbad The Sailor skrev:<span style="color:blue"> > Good Morning All. > > Over the weekend, I have been helping my neighbour with her wireless > internet. It has been set up OK, and has WEP protection, but I want to > be sure that it is totally secure. > > I thank you all in advance for any advice given. > > -Sinbad</span> Hi Sinbad, First off - WEP is not secure at all - it can be cracked in less than a minute - giving full access to the network for wardrivers. I am using WPA-PSK with AES (as TKIP now also can be cracked). However the pre shared key cannot be recovered from WPA-PSK TKIP, so if the transmitted data is not confidential in any way you may use that too. If i was you i would look into BackTrack3 http://www.remote-exploit.org/backtrack.html as not all of the tools provided for windows is working as good as on Linux. Have a nice day. -- Kind regards Martin Potestas Microsoft MCP | Astaro ACA, ACE CompTIA A+, Server+, Linux+ Quote
Guest Shenan Stanley Posted January 12, 2009 Posted January 12, 2009 Wifi SecuritySinbad The Sailor wrote:<span style="color:blue"> > Over the weekend, I have been helping my neighbour > with her wireless internet. It has been set up OK, and > has WEP protection, but I want to be sure that it is > totally secure. > > To make sure, I took it upon myself to collect a few tools > and attempt to break into her wireless internet connection. > The tools in question were popular ones such as AirCrack, > AirSnort, Easy Wifi Radar, etc. > > I want to use them on my laptop, which is an Acer Extensa > 5220 with an Broadcom 802.11g Wireless Adaptor and > using Windows Vista Home Basic SP1. > > I cannot configure the wireless adaptor to work with the > above programs! I attempted to start AeroDump > (to collect Ivs) but couldn't find my adaptor to work with it! > I was attempting to do it via the GUI, not the binaries which > are available. > > I thank you all in advance for any advice given.</span> Not sure what your query is... In any case - "WEP" and "secure" are not two words I would use together. You should change her wireless to WPA2 with a decent length key. If any part of her network cannot do WPA2 but you actually want her network to be secure - upgrade that part of the network so it can do WPA2. (Without hesitation I suggest it above WEP. I suggest it above WPA as well.) As far as running network testing tools - I don't really consider Vista as a platform for such things. ;-) -- Shenan Stanley MS-MVP -- How To Ask Questions The Smart Way http://www.catb.org/~esr/faqs/smart-questions.html Quote
Guest Sinbad The Sailor Posted January 13, 2009 Posted January 13, 2009 Shenan, Thank you for the reply, and thanks to all others who replied, there is an indescribable wealth of knowledge here. My query was for some sort of instruction to help me use the listed programs for penetration testing. Following your advice, I have changed the security to WPA2 with a 128bit passkey. Now to the penetration testing! Which is the most effective program to capture Ivs and see if I can reveal the passkey? Thanks all. -Sinbad On 12/01/2009 13:47, in article e7TdhxLdJHA.2400@TK2MSFTNGP03.phx.gbl, "Shenan Stanley" <newshelper@gmail.com> wrote: <span style="color:blue"> > Wifi SecuritySinbad The Sailor wrote:<span style="color:green"> >> Over the weekend, I have been helping my neighbour >> with her wireless internet. It has been set up OK, and >> has WEP protection, but I want to be sure that it is >> totally secure. >> >> To make sure, I took it upon myself to collect a few tools >> and attempt to break into her wireless internet connection. >> The tools in question were popular ones such as AirCrack, >> AirSnort, Easy Wifi Radar, etc. >> >> I want to use them on my laptop, which is an Acer Extensa >> 5220 with an Broadcom 802.11g Wireless Adaptor and >> using Windows Vista Home Basic SP1. >> >> I cannot configure the wireless adaptor to work with the >> above programs! I attempted to start AeroDump >> (to collect Ivs) but couldn't find my adaptor to work with it! >> I was attempting to do it via the GUI, not the binaries which >> are available. >> >> I thank you all in advance for any advice given.</span> > > Not sure what your query is... > > In any case - "WEP" and "secure" are not two words I would use together. > You should change her wireless to WPA2 with a decent length key. If any > part of her network cannot do WPA2 but you actually want her network to be > secure - upgrade that part of the network so it can do WPA2. (Without > hesitation I suggest it above WEP. I suggest it above WPA as well.) > > As far as running network testing tools - I don't really consider Vista as a > platform for such things. ;-)</span> Quote
Guest E. Cox Posted January 13, 2009 Posted January 13, 2009 Well, if you want to try to break the security just as an exercise, have fun. There are a lot of tools but you may not have much luck getting them for the Windows platform. You had mentioned "totally secure"... it is not going to happen! If your neighbour has something of value to somebody else, and if that somebody else has enough desire, that wifi security will be broken or bypassed entirely. Internal devices like firewalls and such will add addtional securty measures. Then add in good practices and secure those endpoints! Most of the damage to a person's network happens right from that person's own computer by their own hand. One good trojan and that machine is owned... wifi security had nothing to do with it! If she is just a regular person with a home-based internet connection, the security you setup should be plenty. Just monitor the wifi logs to see if other machines try to connect. Turn on MAC authentication for one more layer of protection. Change the WPA2 key on a regular basis, update the firmware as needed, and lock down all systems that are used.... unless there is a threat nearby with a motive against her, what you've done so far should be plenty to keep her secure. Now, turn your attention to her workstations and secure them. "Sinbad The Sailor" wrote: <span style="color:blue"> > Shenan, > > Thank you for the reply, and thanks to all others who replied, there is an > indescribable wealth of knowledge here. > > My query was for some sort of instruction to help me use the listed programs > for penetration testing. > > Following your advice, I have changed the security to WPA2 with a 128bit > passkey. > > Now to the penetration testing! Which is the most effective program to > capture Ivs and see if I can reveal the passkey? > > Thanks all. > > -Sinbad > > > On 12/01/2009 13:47, in article e7TdhxLdJHA.2400@TK2MSFTNGP03.phx.gbl, > "Shenan Stanley" <newshelper@gmail.com> wrote: > <span style="color:green"> > > Wifi SecuritySinbad The Sailor wrote:<span style="color:darkred"> > >> Over the weekend, I have been helping my neighbour > >> with her wireless internet. It has been set up OK, and > >> has WEP protection, but I want to be sure that it is > >> totally secure. > >> > >> To make sure, I took it upon myself to collect a few tools > >> and attempt to break into her wireless internet connection. > >> The tools in question were popular ones such as AirCrack, > >> AirSnort, Easy Wifi Radar, etc. > >> > >> I want to use them on my laptop, which is an Acer Extensa > >> 5220 with an Broadcom 802.11g Wireless Adaptor and > >> using Windows Vista Home Basic SP1. > >> > >> I cannot configure the wireless adaptor to work with the > >> above programs! I attempted to start AeroDump > >> (to collect Ivs) but couldn't find my adaptor to work with it! > >> I was attempting to do it via the GUI, not the binaries which > >> are available. > >> > >> I thank you all in advance for any advice given.</span> > > > > Not sure what your query is... > > > > In any case - "WEP" and "secure" are not two words I would use together. > > You should change her wireless to WPA2 with a decent length key. If any > > part of her network cannot do WPA2 but you actually want her network to be > > secure - upgrade that part of the network so it can do WPA2. (Without > > hesitation I suggest it above WEP. I suggest it above WPA as well.) > > > > As far as running network testing tools - I don't really consider Vista as a > > platform for such things. ;-)</span> > > </span> Quote
Guest Sinbad The Sailor Posted January 19, 2009 Posted January 19, 2009 Good Afternoon All, Following your advice I got myself a copy of the Backtrack 3 boot CD to use on my laptop, to try and break the security I made. However the laptop doesn't attempt to boot off the CD so does this mean I have to mess with the BIOS settings on my laptop to check for a CD before booting off the HDD? I'm hoping when I can sort this problem, I can keep the settings and everything so when I work on other people's wifi I can do it all quickly and easily. Thanks all. -Sinbad On 13/01/2009 19:42, in article 2F7EA7C6-CB5A-447C-953F-34F2DDAC31AE@microsoft.com, "E. Cox" <ECox@discussions.microsoft.com> wrote: <span style="color:blue"> > Well, if you want to try to break the security just as an exercise, have fun. > There are a lot of tools but you may not have much luck getting them for the > Windows platform. > > You had mentioned "totally secure"... it is not going to happen! If your > neighbour has something of value to somebody else, and if that somebody else > has enough desire, that wifi security will be broken or bypassed entirely. > Internal devices like firewalls and such will add addtional securty measures. > Then add in good practices and secure those endpoints! Most of the damage > to a person's network happens right from that person's own computer by their > own hand. One good trojan and that machine is owned... wifi security had > nothing to do with it! > > If she is just a regular person with a home-based internet connection, the > security you setup should be plenty. Just monitor the wifi logs to see if > other machines try to connect. Turn on MAC authentication for one more layer > of protection. Change the WPA2 key on a regular basis, update the firmware > as needed, and lock down all systems that are used.... unless there is a > threat nearby with a motive against her, what you've done so far should be > plenty to keep her secure. Now, turn your attention to her workstations and > secure them. > > "Sinbad The Sailor" wrote: > <span style="color:green"> >> Shenan, >> >> Thank you for the reply, and thanks to all others who replied, there is an >> indescribable wealth of knowledge here. >> >> My query was for some sort of instruction to help me use the listed programs >> for penetration testing. >> >> Following your advice, I have changed the security to WPA2 with a 128bit >> passkey. >> >> Now to the penetration testing! Which is the most effective program to >> capture Ivs and see if I can reveal the passkey? >> >> Thanks all. >> >> -Sinbad >> >> >> On 12/01/2009 13:47, in article e7TdhxLdJHA.2400@TK2MSFTNGP03.phx.gbl, >> "Shenan Stanley" <newshelper@gmail.com> wrote: >> <span style="color:darkred"> >>> Wifi SecuritySinbad The Sailor wrote: >>>> Over the weekend, I have been helping my neighbour >>>> with her wireless internet. It has been set up OK, and >>>> has WEP protection, but I want to be sure that it is >>>> totally secure. >>>> >>>> To make sure, I took it upon myself to collect a few tools >>>> and attempt to break into her wireless internet connection. >>>> The tools in question were popular ones such as AirCrack, >>>> AirSnort, Easy Wifi Radar, etc. >>>> >>>> I want to use them on my laptop, which is an Acer Extensa >>>> 5220 with an Broadcom 802.11g Wireless Adaptor and >>>> using Windows Vista Home Basic SP1. >>>> >>>> I cannot configure the wireless adaptor to work with the >>>> above programs! I attempted to start AeroDump >>>> (to collect Ivs) but couldn't find my adaptor to work with it! >>>> I was attempting to do it via the GUI, not the binaries which >>>> are available. >>>> >>>> I thank you all in advance for any advice given. >>> >>> Not sure what your query is... >>> >>> In any case - "WEP" and "secure" are not two words I would use together. >>> You should change her wireless to WPA2 with a decent length key. If any >>> part of her network cannot do WPA2 but you actually want her network to be >>> secure - upgrade that part of the network so it can do WPA2. (Without >>> hesitation I suggest it above WEP. I suggest it above WPA as well.) >>> >>> As far as running network testing tools - I don't really consider Vista as a >>> platform for such things. ;-)</span> >> >> </span></span> Quote
Guest FromTheRafters Posted January 19, 2009 Posted January 19, 2009 Yes, you have to set the option to boot from the live CD in the CMOS setup program. Are you familiar with Linux? IIRC Backtrack is a Linux based pen- test disk. "Sinbad The Sailor" <roliasehtdabnis@sinbadthesailor.net> wrote in message news:C59A112B.30EF%roliasehtdabnis@sinbadthesailor.net...<span style="color:blue"> > Good Afternoon All, > > Following your advice I got myself a copy of the Backtrack 3 boot CD to > use > on my laptop, to try and break the security I made. However the laptop > doesn't attempt to boot off the CD so does this mean I have to mess with > the > BIOS settings on my laptop to check for a CD before booting off the HDD? > > I'm hoping when I can sort this problem, I can keep the settings and > everything so when I work on other people's wifi I can do it all quickly > and > easily. > > Thanks all. > > -Sinbad > > > On 13/01/2009 19:42, in article > 2F7EA7C6-CB5A-447C-953F-34F2DDAC31AE@microsoft.com, "E. Cox" > <ECox@discussions.microsoft.com> wrote: ><span style="color:green"> >> Well, if you want to try to break the security just as an exercise, have >> fun. >> There are a lot of tools but you may not have much luck getting them for >> the >> Windows platform. >> >> You had mentioned "totally secure"... it is not going to happen! If your >> neighbour has something of value to somebody else, and if that somebody >> else >> has enough desire, that wifi security will be broken or bypassed >> entirely. >> Internal devices like firewalls and such will add addtional securty >> measures. >> Then add in good practices and secure those endpoints! Most of the >> damage >> to a person's network happens right from that person's own computer by >> their >> own hand. One good trojan and that machine is owned... wifi security had >> nothing to do with it! >> >> If she is just a regular person with a home-based internet connection, >> the >> security you setup should be plenty. Just monitor the wifi logs to see >> if >> other machines try to connect. Turn on MAC authentication for one more >> layer >> of protection. Change the WPA2 key on a regular basis, update the >> firmware >> as needed, and lock down all systems that are used.... unless there is a >> threat nearby with a motive against her, what you've done so far should >> be >> plenty to keep her secure. Now, turn your attention to her workstations >> and >> secure them. >> >> "Sinbad The Sailor" wrote: >><span style="color:darkred"> >>> Shenan, >>> >>> Thank you for the reply, and thanks to all others who replied, there is >>> an >>> indescribable wealth of knowledge here. >>> >>> My query was for some sort of instruction to help me use the listed >>> programs >>> for penetration testing. >>> >>> Following your advice, I have changed the security to WPA2 with a 128bit >>> passkey. >>> >>> Now to the penetration testing! Which is the most effective program to >>> capture Ivs and see if I can reveal the passkey? >>> >>> Thanks all. >>> >>> -Sinbad >>> >>> >>> On 12/01/2009 13:47, in article e7TdhxLdJHA.2400@TK2MSFTNGP03.phx.gbl, >>> "Shenan Stanley" <newshelper@gmail.com> wrote: >>> >>>> Wifi SecuritySinbad The Sailor wrote: >>>>> Over the weekend, I have been helping my neighbour >>>>> with her wireless internet. It has been set up OK, and >>>>> has WEP protection, but I want to be sure that it is >>>>> totally secure. >>>>> >>>>> To make sure, I took it upon myself to collect a few tools >>>>> and attempt to break into her wireless internet connection. >>>>> The tools in question were popular ones such as AirCrack, >>>>> AirSnort, Easy Wifi Radar, etc. >>>>> >>>>> I want to use them on my laptop, which is an Acer Extensa >>>>> 5220 with an Broadcom 802.11g Wireless Adaptor and >>>>> using Windows Vista Home Basic SP1. >>>>> >>>>> I cannot configure the wireless adaptor to work with the >>>>> above programs! I attempted to start AeroDump >>>>> (to collect Ivs) but couldn't find my adaptor to work with it! >>>>> I was attempting to do it via the GUI, not the binaries which >>>>> are available. >>>>> >>>>> I thank you all in advance for any advice given. >>>> >>>> Not sure what your query is... >>>> >>>> In any case - "WEP" and "secure" are not two words I would use >>>> together. >>>> You should change her wireless to WPA2 with a decent length key. If >>>> any >>>> part of her network cannot do WPA2 but you actually want her network to >>>> be >>>> secure - upgrade that part of the network so it can do WPA2. (Without >>>> hesitation I suggest it above WEP. I suggest it above WPA as well.) >>>> >>>> As far as running network testing tools - I don't really consider Vista >>>> as a >>>> platform for such things. ;-) >>> >>></span></span> > </span> Quote
Guest Sinbad The Sailor Posted January 20, 2009 Posted January 20, 2009 Hello FromTheRafters, Yes, I have used Knoppix many times, mostly just to recover stuff when Windows fails. Is there any major differences I know about? Will a Broadcom 802.11b Wireless adaptor be compatible with the penetration programs that comes with BackTrack 3? Thanks a lot. -Sinbad On 19/01/2009 21:25, in article OuDjuxneJHA.5420@TK2MSFTNGP02.phx.gbl, "FromTheRafters" <erratic@nomail.afraid.org> wrote: <span style="color:blue"> > Yes, you have to set the option to boot from the live > CD in the CMOS setup program. Are you familiar > with Linux? IIRC Backtrack is a Linux based pen- > test disk. > > "Sinbad The Sailor" <roliasehtdabnis@sinbadthesailor.net> wrote in message > news:C59A112B.30EF%roliasehtdabnis@sinbadthesailor.net...<span style="color:green"> >> Good Afternoon All, >> >> Following your advice I got myself a copy of the Backtrack 3 boot CD to >> use >> on my laptop, to try and break the security I made. However the laptop >> doesn't attempt to boot off the CD so does this mean I have to mess with >> the >> BIOS settings on my laptop to check for a CD before booting off the HDD? >> >> I'm hoping when I can sort this problem, I can keep the settings and >> everything so when I work on other people's wifi I can do it all quickly >> and >> easily. >> >> Thanks all. >> >> -Sinbad >> >> >> On 13/01/2009 19:42, in article >> 2F7EA7C6-CB5A-447C-953F-34F2DDAC31AE@microsoft.com, "E. Cox" >> <ECox@discussions.microsoft.com> wrote: >> <span style="color:darkred"> >>> Well, if you want to try to break the security just as an exercise, have >>> fun. >>> There are a lot of tools but you may not have much luck getting them for >>> the >>> Windows platform. >>> >>> You had mentioned "totally secure"... it is not going to happen! If your >>> neighbour has something of value to somebody else, and if that somebody >>> else >>> has enough desire, that wifi security will be broken or bypassed >>> entirely. >>> Internal devices like firewalls and such will add addtional securty >>> measures. >>> Then add in good practices and secure those endpoints! Most of the >>> damage >>> to a person's network happens right from that person's own computer by >>> their >>> own hand. One good trojan and that machine is owned... wifi security had >>> nothing to do with it! >>> >>> If she is just a regular person with a home-based internet connection, >>> the >>> security you setup should be plenty. Just monitor the wifi logs to see >>> if >>> other machines try to connect. Turn on MAC authentication for one more >>> layer >>> of protection. Change the WPA2 key on a regular basis, update the >>> firmware >>> as needed, and lock down all systems that are used.... unless there is a >>> threat nearby with a motive against her, what you've done so far should >>> be >>> plenty to keep her secure. Now, turn your attention to her workstations >>> and >>> secure them. >>> >>> "Sinbad The Sailor" wrote: >>> >>>> Shenan, >>>> >>>> Thank you for the reply, and thanks to all others who replied, there is >>>> an >>>> indescribable wealth of knowledge here. >>>> >>>> My query was for some sort of instruction to help me use the listed >>>> programs >>>> for penetration testing. >>>> >>>> Following your advice, I have changed the security to WPA2 with a 128bit >>>> passkey. >>>> >>>> Now to the penetration testing! Which is the most effective program to >>>> capture Ivs and see if I can reveal the passkey? >>>> >>>> Thanks all. >>>> >>>> -Sinbad >>>> >>>> >>>> On 12/01/2009 13:47, in article e7TdhxLdJHA.2400@TK2MSFTNGP03.phx.gbl, >>>> "Shenan Stanley" <newshelper@gmail.com> wrote: >>>> >>>>> Wifi SecuritySinbad The Sailor wrote: >>>>>> Over the weekend, I have been helping my neighbour >>>>>> with her wireless internet. It has been set up OK, and >>>>>> has WEP protection, but I want to be sure that it is >>>>>> totally secure. >>>>>> >>>>>> To make sure, I took it upon myself to collect a few tools >>>>>> and attempt to break into her wireless internet connection. >>>>>> The tools in question were popular ones such as AirCrack, >>>>>> AirSnort, Easy Wifi Radar, etc. >>>>>> >>>>>> I want to use them on my laptop, which is an Acer Extensa >>>>>> 5220 with an Broadcom 802.11g Wireless Adaptor and >>>>>> using Windows Vista Home Basic SP1. >>>>>> >>>>>> I cannot configure the wireless adaptor to work with the >>>>>> above programs! I attempted to start AeroDump >>>>>> (to collect Ivs) but couldn't find my adaptor to work with it! >>>>>> I was attempting to do it via the GUI, not the binaries which >>>>>> are available. >>>>>> >>>>>> I thank you all in advance for any advice given. >>>>> >>>>> Not sure what your query is... >>>>> >>>>> In any case - "WEP" and "secure" are not two words I would use >>>>> together. >>>>> You should change her wireless to WPA2 with a decent length key. If >>>>> any >>>>> part of her network cannot do WPA2 but you actually want her network to >>>>> be >>>>> secure - upgrade that part of the network so it can do WPA2. (Without >>>>> hesitation I suggest it above WEP. I suggest it above WPA as well.) >>>>> >>>>> As far as running network testing tools - I don't really consider Vista >>>>> as a >>>>> platform for such things. ;-) >>>> >>>> </span> >> </span> > > </span> Quote
Guest David Carrasco Posted January 20, 2009 Posted January 20, 2009 I'd recommend you to go to the program's wiki site: http://wiki.remote-exploit.org/index.php/Main_Page Best, -- David C. Microsoft Certified Trainer http://www.heroescertificados.com "Sinbad The Sailor" <roliasehtdabnis@sinbadthesailor.net> escribió en el mensaje de noticias:C59B3EFE.3177%roliasehtdabnis@sinbadthesailor.net...<span style="color:blue"> > Hello FromTheRafters, > > Yes, I have used Knoppix many times, mostly just to recover stuff when > Windows fails. Is there any major differences I know about? > > Will a Broadcom 802.11b Wireless adaptor be compatible with the > penetration > programs that comes with BackTrack 3? > > Thanks a lot. > > -Sinbad > > > On 19/01/2009 21:25, in article OuDjuxneJHA.5420@TK2MSFTNGP02.phx.gbl, > "FromTheRafters" <erratic@nomail.afraid.org> wrote: ><span style="color:green"> >> Yes, you have to set the option to boot from the live >> CD in the CMOS setup program. Are you familiar >> with Linux? IIRC Backtrack is a Linux based pen- >> test disk. >> >> "Sinbad The Sailor" <roliasehtdabnis@sinbadthesailor.net> wrote in >> message >> news:C59A112B.30EF%roliasehtdabnis@sinbadthesailor.net...<span style="color:darkred"> >>> Good Afternoon All, >>> >>> Following your advice I got myself a copy of the Backtrack 3 boot CD to >>> use >>> on my laptop, to try and break the security I made. However the laptop >>> doesn't attempt to boot off the CD so does this mean I have to mess with >>> the >>> BIOS settings on my laptop to check for a CD before booting off the HDD? >>> >>> I'm hoping when I can sort this problem, I can keep the settings and >>> everything so when I work on other people's wifi I can do it all quickly >>> and >>> easily. >>> >>> Thanks all. >>> >>> -Sinbad >>> >>> >>> On 13/01/2009 19:42, in article >>> 2F7EA7C6-CB5A-447C-953F-34F2DDAC31AE@microsoft.com, "E. Cox" >>> <ECox@discussions.microsoft.com> wrote: >>> >>>> Well, if you want to try to break the security just as an exercise, >>>> have >>>> fun. >>>> There are a lot of tools but you may not have much luck getting them >>>> for >>>> the >>>> Windows platform. >>>> >>>> You had mentioned "totally secure"... it is not going to happen! If >>>> your >>>> neighbour has something of value to somebody else, and if that somebody >>>> else >>>> has enough desire, that wifi security will be broken or bypassed >>>> entirely. >>>> Internal devices like firewalls and such will add addtional securty >>>> measures. >>>> Then add in good practices and secure those endpoints! Most of the >>>> damage >>>> to a person's network happens right from that person's own computer by >>>> their >>>> own hand. One good trojan and that machine is owned... wifi security >>>> had >>>> nothing to do with it! >>>> >>>> If she is just a regular person with a home-based internet connection, >>>> the >>>> security you setup should be plenty. Just monitor the wifi logs to see >>>> if >>>> other machines try to connect. Turn on MAC authentication for one more >>>> layer >>>> of protection. Change the WPA2 key on a regular basis, update the >>>> firmware >>>> as needed, and lock down all systems that are used.... unless there is >>>> a >>>> threat nearby with a motive against her, what you've done so far should >>>> be >>>> plenty to keep her secure. Now, turn your attention to her >>>> workstations >>>> and >>>> secure them. >>>> >>>> "Sinbad The Sailor" wrote: >>>> >>>>> Shenan, >>>>> >>>>> Thank you for the reply, and thanks to all others who replied, there >>>>> is >>>>> an >>>>> indescribable wealth of knowledge here. >>>>> >>>>> My query was for some sort of instruction to help me use the listed >>>>> programs >>>>> for penetration testing. >>>>> >>>>> Following your advice, I have changed the security to WPA2 with a >>>>> 128bit >>>>> passkey. >>>>> >>>>> Now to the penetration testing! Which is the most effective program to >>>>> capture Ivs and see if I can reveal the passkey? >>>>> >>>>> Thanks all. >>>>> >>>>> -Sinbad >>>>> >>>>> >>>>> On 12/01/2009 13:47, in article e7TdhxLdJHA.2400@TK2MSFTNGP03.phx.gbl, >>>>> "Shenan Stanley" <newshelper@gmail.com> wrote: >>>>> >>>>>> Wifi SecuritySinbad The Sailor wrote: >>>>>>> Over the weekend, I have been helping my neighbour >>>>>>> with her wireless internet. It has been set up OK, and >>>>>>> has WEP protection, but I want to be sure that it is >>>>>>> totally secure. >>>>>>> >>>>>>> To make sure, I took it upon myself to collect a few tools >>>>>>> and attempt to break into her wireless internet connection. >>>>>>> The tools in question were popular ones such as AirCrack, >>>>>>> AirSnort, Easy Wifi Radar, etc. >>>>>>> >>>>>>> I want to use them on my laptop, which is an Acer Extensa >>>>>>> 5220 with an Broadcom 802.11g Wireless Adaptor and >>>>>>> using Windows Vista Home Basic SP1. >>>>>>> >>>>>>> I cannot configure the wireless adaptor to work with the >>>>>>> above programs! I attempted to start AeroDump >>>>>>> (to collect Ivs) but couldn't find my adaptor to work with it! >>>>>>> I was attempting to do it via the GUI, not the binaries which >>>>>>> are available. >>>>>>> >>>>>>> I thank you all in advance for any advice given. >>>>>> >>>>>> Not sure what your query is... >>>>>> >>>>>> In any case - "WEP" and "secure" are not two words I would use >>>>>> together. >>>>>> You should change her wireless to WPA2 with a decent length key. If >>>>>> any >>>>>> part of her network cannot do WPA2 but you actually want her network >>>>>> to >>>>>> be >>>>>> secure - upgrade that part of the network so it can do WPA2. >>>>>> (Without >>>>>> hesitation I suggest it above WEP. I suggest it above WPA as well.) >>>>>> >>>>>> As far as running network testing tools - I don't really consider >>>>>> Vista >>>>>> as a >>>>>> platform for such things. ;-) >>>>> >>>>> >>></span> >> >></span> > </span> Quote
Guest FromTheRafters Posted January 21, 2009 Posted January 21, 2009 No, I was just thrown off by your having to ask about how to boot from a live CD. GUI's are easy no matter what the OS, but when you have to use the command line for Linux - and you are unfamiliar with it - it can be problematic. Check out the wiki for it as David Carrasco suggests in his post, they have hardware compatibility listings and such there. "Sinbad The Sailor" <roliasehtdabnis@sinbadthesailor.net> wrote in message news:C59B3EFE.3177%roliasehtdabnis@sinbadthesailor.net...<span style="color:blue"> > Hello FromTheRafters, > > Yes, I have used Knoppix many times, mostly just to recover stuff when > Windows fails. Is there any major differences I know about? > > Will a Broadcom 802.11b Wireless adaptor be compatible with the > penetration > programs that comes with BackTrack 3? > > Thanks a lot. > > -Sinbad > > > On 19/01/2009 21:25, in article OuDjuxneJHA.5420@TK2MSFTNGP02.phx.gbl, > "FromTheRafters" <erratic@nomail.afraid.org> wrote: ><span style="color:green"> >> Yes, you have to set the option to boot from the live >> CD in the CMOS setup program. Are you familiar >> with Linux? IIRC Backtrack is a Linux based pen- >> test disk. >> >> "Sinbad The Sailor" <roliasehtdabnis@sinbadthesailor.net> wrote in >> message >> news:C59A112B.30EF%roliasehtdabnis@sinbadthesailor.net...<span style="color:darkred"> >>> Good Afternoon All, >>> >>> Following your advice I got myself a copy of the Backtrack 3 boot CD to >>> use >>> on my laptop, to try and break the security I made. However the laptop >>> doesn't attempt to boot off the CD so does this mean I have to mess with >>> the >>> BIOS settings on my laptop to check for a CD before booting off the HDD? >>> >>> I'm hoping when I can sort this problem, I can keep the settings and >>> everything so when I work on other people's wifi I can do it all quickly >>> and >>> easily. >>> >>> Thanks all. >>> >>> -Sinbad >>> >>> >>> On 13/01/2009 19:42, in article >>> 2F7EA7C6-CB5A-447C-953F-34F2DDAC31AE@microsoft.com, "E. Cox" >>> <ECox@discussions.microsoft.com> wrote: >>> >>>> Well, if you want to try to break the security just as an exercise, >>>> have >>>> fun. >>>> There are a lot of tools but you may not have much luck getting them >>>> for >>>> the >>>> Windows platform. >>>> >>>> You had mentioned "totally secure"... it is not going to happen! If >>>> your >>>> neighbour has something of value to somebody else, and if that somebody >>>> else >>>> has enough desire, that wifi security will be broken or bypassed >>>> entirely. >>>> Internal devices like firewalls and such will add addtional securty >>>> measures. >>>> Then add in good practices and secure those endpoints! Most of the >>>> damage >>>> to a person's network happens right from that person's own computer by >>>> their >>>> own hand. One good trojan and that machine is owned... wifi security >>>> had >>>> nothing to do with it! >>>> >>>> If she is just a regular person with a home-based internet connection, >>>> the >>>> security you setup should be plenty. Just monitor the wifi logs to see >>>> if >>>> other machines try to connect. Turn on MAC authentication for one more >>>> layer >>>> of protection. Change the WPA2 key on a regular basis, update the >>>> firmware >>>> as needed, and lock down all systems that are used.... unless there is >>>> a >>>> threat nearby with a motive against her, what you've done so far should >>>> be >>>> plenty to keep her secure. Now, turn your attention to her >>>> workstations >>>> and >>>> secure them. >>>> >>>> "Sinbad The Sailor" wrote: >>>> >>>>> Shenan, >>>>> >>>>> Thank you for the reply, and thanks to all others who replied, there >>>>> is >>>>> an >>>>> indescribable wealth of knowledge here. >>>>> >>>>> My query was for some sort of instruction to help me use the listed >>>>> programs >>>>> for penetration testing. >>>>> >>>>> Following your advice, I have changed the security to WPA2 with a >>>>> 128bit >>>>> passkey. >>>>> >>>>> Now to the penetration testing! Which is the most effective program to >>>>> capture Ivs and see if I can reveal the passkey? >>>>> >>>>> Thanks all. >>>>> >>>>> -Sinbad >>>>> >>>>> >>>>> On 12/01/2009 13:47, in article e7TdhxLdJHA.2400@TK2MSFTNGP03.phx.gbl, >>>>> "Shenan Stanley" <newshelper@gmail.com> wrote: >>>>> >>>>>> Wifi SecuritySinbad The Sailor wrote: >>>>>>> Over the weekend, I have been helping my neighbour >>>>>>> with her wireless internet. It has been set up OK, and >>>>>>> has WEP protection, but I want to be sure that it is >>>>>>> totally secure. >>>>>>> >>>>>>> To make sure, I took it upon myself to collect a few tools >>>>>>> and attempt to break into her wireless internet connection. >>>>>>> The tools in question were popular ones such as AirCrack, >>>>>>> AirSnort, Easy Wifi Radar, etc. >>>>>>> >>>>>>> I want to use them on my laptop, which is an Acer Extensa >>>>>>> 5220 with an Broadcom 802.11g Wireless Adaptor and >>>>>>> using Windows Vista Home Basic SP1. >>>>>>> >>>>>>> I cannot configure the wireless adaptor to work with the >>>>>>> above programs! I attempted to start AeroDump >>>>>>> (to collect Ivs) but couldn't find my adaptor to work with it! >>>>>>> I was attempting to do it via the GUI, not the binaries which >>>>>>> are available. >>>>>>> >>>>>>> I thank you all in advance for any advice given. >>>>>> >>>>>> Not sure what your query is... >>>>>> >>>>>> In any case - "WEP" and "secure" are not two words I would use >>>>>> together. >>>>>> You should change her wireless to WPA2 with a decent length key. If >>>>>> any >>>>>> part of her network cannot do WPA2 but you actually want her network >>>>>> to >>>>>> be >>>>>> secure - upgrade that part of the network so it can do WPA2. >>>>>> (Without >>>>>> hesitation I suggest it above WEP. I suggest it above WPA as well.) >>>>>> >>>>>> As far as running network testing tools - I don't really consider >>>>>> Vista >>>>>> as a >>>>>> platform for such things. ;-) >>>>> >>>>> >>></span> >> >></span> > </span> Quote
Guest Sinbad The Sailor Posted January 22, 2009 Posted January 22, 2009 Hello All, I followed your advice and checked the wiki site for compatability issues... However, I could find neither my laptop or wireless card, and there was no 'If your hardware is not listed here' line... Should I go right ahead and try it out or are there risks to take into account first? Thanks. Sinbad On 21/01/2009 02:08, in article O2HBn02eJHA.1292@TK2MSFTNGP02.phx.gbl, "FromTheRafters" <erratic@nomail.afraid.org> wrote: <span style="color:blue"> > No, I was just thrown off by your having to ask about how > to boot from a live CD. GUI's are easy no matter what the > OS, but when you have to use the command line for Linux > - and you are unfamiliar with it - it can be problematic. > > Check out the wiki for it as David Carrasco suggests in his post, > they have hardware compatibility listings and such there. > > "Sinbad The Sailor" <roliasehtdabnis@sinbadthesailor.net> wrote in message > news:C59B3EFE.3177%roliasehtdabnis@sinbadthesailor.net...<span style="color:green"> >> Hello FromTheRafters, >> >> Yes, I have used Knoppix many times, mostly just to recover stuff when >> Windows fails. Is there any major differences I know about? >> >> Will a Broadcom 802.11b Wireless adaptor be compatible with the >> penetration >> programs that comes with BackTrack 3? >> >> Thanks a lot. >> >> -Sinbad >> >> >> On 19/01/2009 21:25, in article OuDjuxneJHA.5420@TK2MSFTNGP02.phx.gbl, >> "FromTheRafters" <erratic@nomail.afraid.org> wrote: >> <span style="color:darkred"> >>> Yes, you have to set the option to boot from the live >>> CD in the CMOS setup program. Are you familiar >>> with Linux? IIRC Backtrack is a Linux based pen- >>> test disk. >>> >>> "Sinbad The Sailor" <roliasehtdabnis@sinbadthesailor.net> wrote in >>> message >>> news:C59A112B.30EF%roliasehtdabnis@sinbadthesailor.net... >>>> Good Afternoon All, >>>> >>>> Following your advice I got myself a copy of the Backtrack 3 boot CD to >>>> use >>>> on my laptop, to try and break the security I made. However the laptop >>>> doesn't attempt to boot off the CD so does this mean I have to mess with >>>> the >>>> BIOS settings on my laptop to check for a CD before booting off the HDD? >>>> >>>> I'm hoping when I can sort this problem, I can keep the settings and >>>> everything so when I work on other people's wifi I can do it all quickly >>>> and >>>> easily. >>>> >>>> Thanks all. >>>> >>>> -Sinbad >>>> >>>> >>>> On 13/01/2009 19:42, in article >>>> 2F7EA7C6-CB5A-447C-953F-34F2DDAC31AE@microsoft.com, "E. Cox" >>>> <ECox@discussions.microsoft.com> wrote: >>>> >>>>> Well, if you want to try to break the security just as an exercise, >>>>> have >>>>> fun. >>>>> There are a lot of tools but you may not have much luck getting them >>>>> for >>>>> the >>>>> Windows platform. >>>>> >>>>> You had mentioned "totally secure"... it is not going to happen! If >>>>> your >>>>> neighbour has something of value to somebody else, and if that somebody >>>>> else >>>>> has enough desire, that wifi security will be broken or bypassed >>>>> entirely. >>>>> Internal devices like firewalls and such will add addtional securty >>>>> measures. >>>>> Then add in good practices and secure those endpoints! Most of the >>>>> damage >>>>> to a person's network happens right from that person's own computer by >>>>> their >>>>> own hand. One good trojan and that machine is owned... wifi security >>>>> had >>>>> nothing to do with it! >>>>> >>>>> If she is just a regular person with a home-based internet connection, >>>>> the >>>>> security you setup should be plenty. Just monitor the wifi logs to see >>>>> if >>>>> other machines try to connect. Turn on MAC authentication for one more >>>>> layer >>>>> of protection. Change the WPA2 key on a regular basis, update the >>>>> firmware >>>>> as needed, and lock down all systems that are used.... unless there is >>>>> a >>>>> threat nearby with a motive against her, what you've done so far should >>>>> be >>>>> plenty to keep her secure. Now, turn your attention to her >>>>> workstations >>>>> and >>>>> secure them. >>>>> >>>>> "Sinbad The Sailor" wrote: >>>>> >>>>>> Shenan, >>>>>> >>>>>> Thank you for the reply, and thanks to all others who replied, there >>>>>> is >>>>>> an >>>>>> indescribable wealth of knowledge here. >>>>>> >>>>>> My query was for some sort of instruction to help me use the listed >>>>>> programs >>>>>> for penetration testing. >>>>>> >>>>>> Following your advice, I have changed the security to WPA2 with a >>>>>> 128bit >>>>>> passkey. >>>>>> >>>>>> Now to the penetration testing! Which is the most effective program to >>>>>> capture Ivs and see if I can reveal the passkey? >>>>>> >>>>>> Thanks all. >>>>>> >>>>>> -Sinbad >>>>>> >>>>>> >>>>>> On 12/01/2009 13:47, in article e7TdhxLdJHA.2400@TK2MSFTNGP03.phx.gbl, >>>>>> "Shenan Stanley" <newshelper@gmail.com> wrote: >>>>>> >>>>>>> Wifi SecuritySinbad The Sailor wrote: >>>>>>>> Over the weekend, I have been helping my neighbour >>>>>>>> with her wireless internet. It has been set up OK, and >>>>>>>> has WEP protection, but I want to be sure that it is >>>>>>>> totally secure. >>>>>>>> >>>>>>>> To make sure, I took it upon myself to collect a few tools >>>>>>>> and attempt to break into her wireless internet connection. >>>>>>>> The tools in question were popular ones such as AirCrack, >>>>>>>> AirSnort, Easy Wifi Radar, etc. >>>>>>>> >>>>>>>> I want to use them on my laptop, which is an Acer Extensa >>>>>>>> 5220 with an Broadcom 802.11g Wireless Adaptor and >>>>>>>> using Windows Vista Home Basic SP1. >>>>>>>> >>>>>>>> I cannot configure the wireless adaptor to work with the >>>>>>>> above programs! I attempted to start AeroDump >>>>>>>> (to collect Ivs) but couldn't find my adaptor to work with it! >>>>>>>> I was attempting to do it via the GUI, not the binaries which >>>>>>>> are available. >>>>>>>> >>>>>>>> I thank you all in advance for any advice given. >>>>>>> >>>>>>> Not sure what your query is... >>>>>>> >>>>>>> In any case - "WEP" and "secure" are not two words I would use >>>>>>> together. >>>>>>> You should change her wireless to WPA2 with a decent length key. If >>>>>>> any >>>>>>> part of her network cannot do WPA2 but you actually want her network >>>>>>> to >>>>>>> be >>>>>>> secure - upgrade that part of the network so it can do WPA2. >>>>>>> (Without >>>>>>> hesitation I suggest it above WEP. I suggest it above WPA as well.) >>>>>>> >>>>>>> As far as running network testing tools - I don't really consider >>>>>>> Vista >>>>>>> as a >>>>>>> platform for such things. ;-) >>>>>> >>>>>> >>>> >>> >>> </span> >> </span> > > </span> Quote
Guest FromTheRafters Posted January 24, 2009 Posted January 24, 2009 Why not? The risks? If you have permission to hack into (crack) someone elses network, that is one thing - but if you are getting in to a hostile network, remember that you are running as root by default. "Sinbad The Sailor" <roliasehtdabnis@sinbadthesailor.net> wrote in message news:C59E1800.3297%roliasehtdabnis@sinbadthesailor.net...<span style="color:blue"> > Hello All, > > I followed your advice and checked the wiki site for compatability > issues... > However, I could find neither my laptop or wireless card, and there was no > 'If your hardware is not listed here' line... Should I go right ahead and > try it out or are there risks to take into account first? > > Thanks. > > Sinbad > > > On 21/01/2009 02:08, in article O2HBn02eJHA.1292@TK2MSFTNGP02.phx.gbl, > "FromTheRafters" <erratic@nomail.afraid.org> wrote: ><span style="color:green"> >> No, I was just thrown off by your having to ask about how >> to boot from a live CD. GUI's are easy no matter what the >> OS, but when you have to use the command line for Linux >> - and you are unfamiliar with it - it can be problematic. >> >> Check out the wiki for it as David Carrasco suggests in his post, >> they have hardware compatibility listings and such there. >> >> "Sinbad The Sailor" <roliasehtdabnis@sinbadthesailor.net> wrote in >> message >> news:C59B3EFE.3177%roliasehtdabnis@sinbadthesailor.net...<span style="color:darkred"> >>> Hello FromTheRafters, >>> >>> Yes, I have used Knoppix many times, mostly just to recover stuff when >>> Windows fails. Is there any major differences I know about? >>> >>> Will a Broadcom 802.11b Wireless adaptor be compatible with the >>> penetration >>> programs that comes with BackTrack 3? >>> >>> Thanks a lot. >>> >>> -Sinbad >>> >>> >>> On 19/01/2009 21:25, in article OuDjuxneJHA.5420@TK2MSFTNGP02.phx.gbl, >>> "FromTheRafters" <erratic@nomail.afraid.org> wrote: >>> >>>> Yes, you have to set the option to boot from the live >>>> CD in the CMOS setup program. Are you familiar >>>> with Linux? IIRC Backtrack is a Linux based pen- >>>> test disk. >>>> >>>> "Sinbad The Sailor" <roliasehtdabnis@sinbadthesailor.net> wrote in >>>> message >>>> news:C59A112B.30EF%roliasehtdabnis@sinbadthesailor.net... >>>>> Good Afternoon All, >>>>> >>>>> Following your advice I got myself a copy of the Backtrack 3 boot CD >>>>> to >>>>> use >>>>> on my laptop, to try and break the security I made. However the laptop >>>>> doesn't attempt to boot off the CD so does this mean I have to mess >>>>> with >>>>> the >>>>> BIOS settings on my laptop to check for a CD before booting off the >>>>> HDD? >>>>> >>>>> I'm hoping when I can sort this problem, I can keep the settings and >>>>> everything so when I work on other people's wifi I can do it all >>>>> quickly >>>>> and >>>>> easily. >>>>> >>>>> Thanks all. >>>>> >>>>> -Sinbad >>>>> >>>>> >>>>> On 13/01/2009 19:42, in article >>>>> 2F7EA7C6-CB5A-447C-953F-34F2DDAC31AE@microsoft.com, "E. Cox" >>>>> <ECox@discussions.microsoft.com> wrote: >>>>> >>>>>> Well, if you want to try to break the security just as an exercise, >>>>>> have >>>>>> fun. >>>>>> There are a lot of tools but you may not have much luck getting them >>>>>> for >>>>>> the >>>>>> Windows platform. >>>>>> >>>>>> You had mentioned "totally secure"... it is not going to happen! If >>>>>> your >>>>>> neighbour has something of value to somebody else, and if that >>>>>> somebody >>>>>> else >>>>>> has enough desire, that wifi security will be broken or bypassed >>>>>> entirely. >>>>>> Internal devices like firewalls and such will add addtional securty >>>>>> measures. >>>>>> Then add in good practices and secure those endpoints! Most of the >>>>>> damage >>>>>> to a person's network happens right from that person's own computer >>>>>> by >>>>>> their >>>>>> own hand. One good trojan and that machine is owned... wifi security >>>>>> had >>>>>> nothing to do with it! >>>>>> >>>>>> If she is just a regular person with a home-based internet >>>>>> connection, >>>>>> the >>>>>> security you setup should be plenty. Just monitor the wifi logs to >>>>>> see >>>>>> if >>>>>> other machines try to connect. Turn on MAC authentication for one >>>>>> more >>>>>> layer >>>>>> of protection. Change the WPA2 key on a regular basis, update the >>>>>> firmware >>>>>> as needed, and lock down all systems that are used.... unless there >>>>>> is >>>>>> a >>>>>> threat nearby with a motive against her, what you've done so far >>>>>> should >>>>>> be >>>>>> plenty to keep her secure. Now, turn your attention to her >>>>>> workstations >>>>>> and >>>>>> secure them. >>>>>> >>>>>> "Sinbad The Sailor" wrote: >>>>>> >>>>>>> Shenan, >>>>>>> >>>>>>> Thank you for the reply, and thanks to all others who replied, there >>>>>>> is >>>>>>> an >>>>>>> indescribable wealth of knowledge here. >>>>>>> >>>>>>> My query was for some sort of instruction to help me use the listed >>>>>>> programs >>>>>>> for penetration testing. >>>>>>> >>>>>>> Following your advice, I have changed the security to WPA2 with a >>>>>>> 128bit >>>>>>> passkey. >>>>>>> >>>>>>> Now to the penetration testing! Which is the most effective program >>>>>>> to >>>>>>> capture Ivs and see if I can reveal the passkey? >>>>>>> >>>>>>> Thanks all. >>>>>>> >>>>>>> -Sinbad >>>>>>> >>>>>>> >>>>>>> On 12/01/2009 13:47, in article >>>>>>> e7TdhxLdJHA.2400@TK2MSFTNGP03.phx.gbl, >>>>>>> "Shenan Stanley" <newshelper@gmail.com> wrote: >>>>>>> >>>>>>>> Wifi SecuritySinbad The Sailor wrote: >>>>>>>>> Over the weekend, I have been helping my neighbour >>>>>>>>> with her wireless internet. It has been set up OK, and >>>>>>>>> has WEP protection, but I want to be sure that it is >>>>>>>>> totally secure. >>>>>>>>> >>>>>>>>> To make sure, I took it upon myself to collect a few tools >>>>>>>>> and attempt to break into her wireless internet connection. >>>>>>>>> The tools in question were popular ones such as AirCrack, >>>>>>>>> AirSnort, Easy Wifi Radar, etc. >>>>>>>>> >>>>>>>>> I want to use them on my laptop, which is an Acer Extensa >>>>>>>>> 5220 with an Broadcom 802.11g Wireless Adaptor and >>>>>>>>> using Windows Vista Home Basic SP1. >>>>>>>>> >>>>>>>>> I cannot configure the wireless adaptor to work with the >>>>>>>>> above programs! I attempted to start AeroDump >>>>>>>>> (to collect Ivs) but couldn't find my adaptor to work with it! >>>>>>>>> I was attempting to do it via the GUI, not the binaries which >>>>>>>>> are available. >>>>>>>>> >>>>>>>>> I thank you all in advance for any advice given. >>>>>>>> >>>>>>>> Not sure what your query is... >>>>>>>> >>>>>>>> In any case - "WEP" and "secure" are not two words I would use >>>>>>>> together. >>>>>>>> You should change her wireless to WPA2 with a decent length key. >>>>>>>> If >>>>>>>> any >>>>>>>> part of her network cannot do WPA2 but you actually want her >>>>>>>> network >>>>>>>> to >>>>>>>> be >>>>>>>> secure - upgrade that part of the network so it can do WPA2. >>>>>>>> (Without >>>>>>>> hesitation I suggest it above WEP. I suggest it above WPA as >>>>>>>> well.) >>>>>>>> >>>>>>>> As far as running network testing tools - I don't really consider >>>>>>>> Vista >>>>>>>> as a >>>>>>>> platform for such things. ;-) >>>>>>> >>>>>>> >>>>> >>>> >>>> >>></span> >> >></span> > </span> Quote
Guest Swamp Thing Posted February 5, 2009 Posted February 5, 2009 When I setup my WIFI network this is what I did to bolt it down. 1. Changed the default SSID and in the new name used special & capital letters, symbols and numbers. 2. Turned off SSID broadcasting 3. Cloak SSID 4. Enabled MAC filtering 5. Disabled Open Key & shared key authentication 6. Enabled WPA with AES encryption with a 12char password using lower & upper case letters, numbers and symbols. 7. Disabled DHCP and have all work station IP addresses static. 8. Enabled firewall on my router and on all workstations If someone can get through all of this then they can have whatever is on my network. Also this can be found in a NSA document regarding WIFI security. http://www.nsa.gov/ia/_files/wireless/I332-008R-2005.pdf however the problem with a setup like this is when you are trying to add a node to the network or if you have guest and they want to get online with their laptop and you don't like outside nodes on the network.... -- Swamp Thing ------------------------------------------------------------------------ Swamp Thing's Profile: http://forums.techarena.in/members/swamp-thing.htm View this thread: http://forums.techarena.in/microsoft-security/1102175.htm http://forums.techarena.in Quote
Guest Swamp Thing Posted February 9, 2009 Posted February 9, 2009 and I also run an anti-virus such as AVG on all workstations and keep it updated. -- Swamp Thing ------------------------------------------------------------------------ Swamp Thing's Profile: http://forums.techarena.in/members/swamp-thing.htm View this thread: http://forums.techarena.in/microsoft-security/1102175.htm http://forums.techarena.in Quote
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.