corsasport.co.uk
 

Corsa Sport » Message Board » Off Day » network people. » Post Reply

Post Reply
Who Can Post? All users can post new topics and all users can reply.
Icon:
Formatting Mode:
Normal
Advanced
Help

Insert Bold text Insert Italicized text Insert Underlined text Insert Centered text Insert a Hyperlink Insert Email Hyperlink Insert an Image Insert Code Formatted text Insert Quoted text
Message:
HTML is Off
Smilies are On
BB Code is On
[img] Code is On
Post Options: Disable smileys?
Turn BBCode off?
Receive email notification of new replies?

willay

posted on 17th Feb 05 at 07:26

cracking wep.

Quick howto from a shell

http://www.burngreave.net/node.php?id=285

AirSnort

http://airsnort.shmoo.com/

WEPcrack

http://wepcrack.sourceforge.net/

Weaknesses in the Key Scheduling Algorithm of RC4

http://www.eyetap.org/~rguerra/toronto2001/rc4_ksaproc.pdf


willay

posted on 17th Feb 05 at 07:19

quote:
Originally posted by Houckham
quote:
Originally posted by Ian
This place sells kitchens and the data is valuable enough to spend a month analysing it?

You'd need to be sat there nearly as long to get enough data to FMS it...


yeah i just dont want anyone using their internet connection and getting hold of their files... obvisouly the genious hackers among us will have no problem. lol :lol:

i just wanna keep mr joe bloggs out! :thumbs:


Okay to keep joe bloggs out I'd suggest,

Largest wep key you can take (last time I installed some gear it was 256bit)

Filtering by mac address

Change all default passwords to admin login and change deault SSID's.

That will keep Mr bloggs out. :thumbs: :)


willay

posted on 17th Feb 05 at 07:17

quote:
Originally posted by Dan B
quote:
Originally posted by willay

...or using WEP isnt brilliant but will do the job I guess :look:

Depends how paranoid you are.

Just checking, but how more secure would you want wireless encryption to be, with a WEP-key that has 13,471,428,653,161,560,586,981,973,426,176 possible combinations? For anyone who doesn't know, 128-bit WEP uses a 26-character key with 22 possibilities for each character.

Assuming a single computer could "brute-force" attempt 100 keys per second, you're still looking at a potential maximum of 4,271,762,003,158,790,140,468 years to break through it. Feel like waiting that long? :)

[Edited on 16-02-2005 by Dan B]


Theres enough papers out shownig how weak the WEP encryption is, once you have sniffed enough packets it doesnt take much processing power to crack it.

People that actually sell security solutions would tell you to GTF with WEP no question about it, nothing beats a good solid IPSEC tunnel.

I'm suprise this came from you Dan, you're normally one of the more clued up posters.

So how secure would I want my wireless connection to be? secure enough to keep people out

[Edited on 17-02-2005 by willay]


Houckham

posted on 17th Feb 05 at 04:25

quote:
Originally posted by Ian
This place sells kitchens and the data is valuable enough to spend a month analysing it?

You'd need to be sat there nearly as long to get enough data to FMS it...


yeah i just dont want anyone using their internet connection and getting hold of their files... obvisouly the genious hackers among us will have no problem. lol :lol:

i just wanna keep mr joe bloggs out! :thumbs:


Ian

posted on 16th Feb 05 at 20:37

This place sells kitchens and the data is valuable enough to spend a month analysing it?

You'd need to be sat there nearly as long to get enough data to FMS it...


Dom

posted on 16th Feb 05 at 19:15

tbh, you would use a big array of servers going at it and marking combinations of a list so not to duplicate etc...tbh i bet you could get it down to a month or so....


John

posted on 16th Feb 05 at 19:09

quote:
Originally posted by Dan B
quote:
Originally posted by willay

...or using WEP isnt brilliant but will do the job I guess :look:

Depends how paranoid you are.

Just checking, but how more secure would you want wireless encryption to be, with a WEP-key that has 13,471,428,653,161,560,586,981,973,426,176 possible combinations? For anyone who doesn't know, 128-bit WEP uses a 26-character key with 22 possibilities for each character.

Assuming a single computer could "brute-force" attempt 100 keys per second, you're still looking at a potential maximum of 4,271,762,003,158,790,140,468 years to break through it. Feel like waiting that long? :)

[Edited on 16-02-2005 by Dan B]


:rolleyes:

Thats not quite as hard as it really is now is it. All you need is a program, ehich is easily obtainable. Apart from breaking the 40 bit keys progs don't use dictionary attacks. They use FMS attacks.


Dan B

posted on 16th Feb 05 at 18:33

quote:
Originally posted by willay

...or using WEP isnt brilliant but will do the job I guess :look:

Depends how paranoid you are.

Just checking, but how more secure would you want wireless encryption to be, with a WEP-key that has 13,471,428,653,161,560,586,981,973,426,176 possible combinations? For anyone who doesn't know, 128-bit WEP uses a 26-character key with 22 possibilities for each character.

Assuming a single computer could "brute-force" attempt 100 keys per second, you're still looking at a potential maximum of 4,271,762,003,158,790,140,468 years to break through it. Feel like waiting that long? :)

[Edited on 16-02-2005 by Dan B]


Houckham

posted on 16th Feb 05 at 14:51

:lol:


Foz

posted on 16th Feb 05 at 14:42

i pick up next doors wireless connection from my wireless pmsl, quite amusing they dont have a firewall or any protection.


Ian

posted on 16th Feb 05 at 14:34

Turn DHCP off, WEP on, filter by MAC etc.

If you're paranoid, wire it.


Melville

posted on 16th Feb 05 at 14:28

perhaps advise them to go back to a manual system then?? Caused me less hassle that way :lol:


Houckham

posted on 16th Feb 05 at 14:27

quote:
Originally posted by Melville
what does it need to be secure for :boggle: they only make kitchens ;)


hahahaha

well they do have a legal obligation to keep the data of the clients they keep on their computer systems secure.
:look:


willay

posted on 16th Feb 05 at 14:27

because nobody likes people sniffing their cleartext traffic. :wave:


Melville

posted on 16th Feb 05 at 14:25

what does it need to be secure for :boggle: they only make kitchens ;)


Houckham

posted on 16th Feb 05 at 14:18

cheers everyone


willay

posted on 16th Feb 05 at 07:32

quote:
Originally posted by Houckham
i have a question. obviously its rather easy to set up 2 wireless routers in this sort of configuration... (bridged)



but i want the bridge to be secure.

what are my options? :boggle:

VPN etc...


The most obvious solution for security would be a IPSEC tunnel (yeah vpn), it would provide the most security along with filtering by MAC address.

Alot of routers have a bridging function, but its normally just repeating the signal or using WEP isnt brilliant but will do the job I guess :look:

Depends how paranoid you are.


drunkenfool

posted on 16th Feb 05 at 07:14

use MAC address blocking if the network isnt too big, and if your routersupports it


TimS

posted on 16th Feb 05 at 00:07

A couple of things

Use a wireless base station that provides built-in security, Start by making sure you use a wireless base station, gateway, or router that provides built-in security features. By providing wireless security protocols and a built-in firewall.

Then use Wired Equivalent Protocol (WEP) Wired Equivalent Protocol (WEP) is a wireless security protocol that helps protect your information by using a security setting (called a WEP key) to encode, or encrypt, all network traffic before transmitting it over the airwaves. This helps prevent unauthorized users from accessing the data as it is being transmitted.

or even better use Wi-Fi Protected Access™ (WPA) WPA is a stronger form of wireless security
Like WEP, WPA uses security settings to encrypt and decrypt data that is transmitted over the network.
However, instead of using one static security key for encryption as WEP does, WPA uses Temporal Key Integrity Protocol (TKIP) to dynamically generate a new key for every packet and generate different sets of keys for each computer.

Then other little things like;
Position wireless components away from windows and toward the center of your home to decrease the strength of the radio signal outside your intended coverage area.

Make sure you follow general security guidelines to protect all parts of your network, not just the wireless segment.


Nismo

posted on 16th Feb 05 at 00:05

i belive its WEP authentication?

cant remember off the top of my head, there should be an option on the router its self to set authentication or MAC address authentication.


Houckham

posted on 16th Feb 05 at 00:02

and as jodi just said "hardwire it" :lol:

... its got to be Wireless! :D


Houckham

posted on 16th Feb 05 at 00:00

i have a question. obviously its rather easy to set up 2 wireless routers in this sort of configuration... (bridged)



but i want the bridge to be secure.

what are my options? :boggle:

VPN etc...