Off-topic Talk Where overpaid, underworked S2000 owners waste the worst part of their days before the drive home. This forum is for general chit chat and discussions not covered by the other off-topic forums.

wireless internet question

Thread Tools
 
Old Dec 16, 2004 | 07:10 AM
  #31  
steven975's Avatar
Registered User
 
Joined: May 2004
Posts: 5,094
Likes: 6
From: Vienna, VA
Default

for ultimate wifi security, you need to get my company's solutions. We make NSA certified 802.11b access points and network cards. Of course YOU can't buy them

WEP is a joke; you should use WPA (only newer stuff does that) or WEP+MAC filtering. Those 2 together are pretty much undefeatable, unless someone knows the accepted MAC address.
Reply
Old Dec 16, 2004 | 08:37 AM
  #32  
yogi's Avatar
Registered User
Gold Member (Premium)
20 Year Member
 
Joined: Oct 2000
Posts: 2,108
Likes: 0
From: Seattle, WA
Default

Working for Harris, I would think you would know that WEP (even +MAC filtering) is very easily defeatable. WPA isn't much harder either...
Reply
Old Dec 16, 2004 | 11:45 AM
  #33  
Elistan's Avatar
Registered User
20 Year Member
 
Joined: Oct 2000
Posts: 15,323
Likes: 28
From: Longmont, CO
Default

Originally Posted by steven975,Dec 16 2004, 10:10 AM
for ultimate wifi security, you need to get my company's solutions. We make NSA certified 802.11b access points and network cards. Of course YOU can't buy them

WEP is a joke; you should use WPA (only newer stuff does that) or WEP+MAC filtering. Those 2 together are pretty much undefeatable, unless someone knows the accepted MAC address.
I've wondered about MAC filtering - sure, that'll block an unauthorized person from communicating with the access point, but it doesn't do anything to stop them listening in on the communication between your devices and the access point, does it?
Reply
Old Dec 16, 2004 | 12:42 PM
  #34  
steven975's Avatar
Registered User
 
Joined: May 2004
Posts: 5,094
Likes: 6
From: Vienna, VA
Default

no, but you'd have to have some VERY sophisticated equipment to decipher what was being transmitted on even an unsecured wifi link.

Mac filtering basically makes it so that only one with an approved MAC can establish a 2-way link with the access point.
Reply
Old Dec 16, 2004 | 01:16 PM
  #35  
yogi's Avatar
Registered User
Gold Member (Premium)
20 Year Member
 
Joined: Oct 2000
Posts: 2,108
Likes: 0
From: Seattle, WA
Default

Don't wanna hijack this thread, but steven975 what the heck are you talking about? VERY sophisticated equipment? I've been sniffing 802.11 for years on my aging P3-600MHz laptop. Not sophisticated by any means at all. MAC filtering isn't difficult defeat....it's super easy to fake MACs.

Maybe you're talking about a certain situation (perhaps with your company equip.), but in general, MAC filtering and WEP cracking is simple.
Reply
Old Dec 18, 2004 | 11:42 AM
  #36  
steven975's Avatar
Registered User
 
Joined: May 2004
Posts: 5,094
Likes: 6
From: Vienna, VA
Default

i'm talking about intercepting info transmitted over 802.11b. like a client putting in a password. you'd need nice equipment to decipher that.

to crack mac filtering, you need to KNOW the mac.
Reply
Old Dec 18, 2004 | 11:57 AM
  #37  
AZWILDCATS's Avatar
Registered User
 
Joined: Dec 2004
Posts: 12,757
Likes: 0
From: Union County New Jersey
Default

Here's one thing I do know for sure, nothing is secure, nothing.

Using WEP is better than not using it. It at least stops casual sniffers. Today, there are readily available tools for most attackers to crack the WEP keys. Airsnort and others tools take a lot of packets (several million) to get the WEP key, on most networks this takes longer than most people are willing to wait. If the network is very busy, the WEP key can be cracked and obtained within 15 minutes.
Reply
Old Dec 18, 2004 | 12:16 PM
  #38  
AZWILDCATS's Avatar
Registered User
 
Joined: Dec 2004
Posts: 12,757
Likes: 0
From: Union County New Jersey
Default

Originally Posted by steven975,Dec 16 2004, 01:42 PM
no, but you'd have to have some VERY sophisticated equipment to decipher what was being transmitted on even an unsecured wifi link.

Mac filtering basically makes it so that only one with an approved MAC can establish a 2-way link with the access point.
Some Access Points have the ability to filter only trusted MAC addresses. MAC addresses are suppose to be unique addresses on the network. This feature is usually very difficult to implement in a dynamic environment due to the tedious nature of trying to configure AP for each and every trusted client. The MAC address is transmitted in the clear text, so any intruder can sniff authorized MAC addresses, and with proper tools, configure and masquerade their MAC address as a legitimate MAC address and by-pass this security mechanism. Enabling this security feature can be more effort than the actual security benefit that it provides.
Reply
Old Dec 18, 2004 | 03:18 PM
  #39  
tritium_pie's Avatar
Registered User
 
Joined: May 2003
Posts: 4,543
Likes: 0
From: Vegas baby!!
Default

[QUOTE=steven975,Dec 18 2004, 12:42 PM] i'm talking about intercepting info transmitted over 802.11b.
Reply
Old Dec 18, 2004 | 07:55 PM
  #40  
yogi's Avatar
Registered User
Gold Member (Premium)
20 Year Member
 
Joined: Oct 2000
Posts: 2,108
Likes: 0
From: Seattle, WA
Default

Originally Posted by steven975,Dec 18 2004, 12:42 PM
i'm talking about intercepting info transmitted over 802.11b. like a client putting in a password. you'd need nice equipment to decipher that.

to crack mac filtering, you need to KNOW the mac.
Spoofing a MAC is easy, finding out valid MACs are even easier, all you have to do is sniff.

Figuring out a password from a client is not a 802.11 sniff/decipher issue, cracking that password depends on how it is encrypted within the data packet, not how the packet itself is protected. There's no refuting it, standard wifi WEP is easy to hack, plain and simple. Bigger keys would help, but all I have to do is capture more traffic.
Reply



All times are GMT -8. The time now is 02:22 PM.