Jump to content
Do Not Sell My Personal Information


  • Join Toyota Owners Club

    Join Europe's Largest Toyota Community! It's FREE!

     

     

How To Secure A Wireless Network


GT4 BOOSTER
 Share

Recommended Posts

well - if the information you posted is factually correct... then yes, i was wr... wr... wro.... I obviously mis-understood just how badly WEP was put together :P

Link to comment
Share on other sites


LOL...

Strangley, WEP is the one protocol i dont actually deal with normally, but I expected it to be the same as normal, but obviously i was wrong... but the rest i was right about...

Link to comment
Share on other sites

ok :lol: that'll have to do. I think we need this topic pinned though..

Friday 30th September - The Day Fidgits was wrong!!

It could be a national holiday!!

Link to comment
Share on other sites


In summary:

Cloaking your SSID gives you virtually no extra security at all. It can still be discovered.

Filtering on MAC address gives you a small amount of security, but most network drivers these days can spoof any MAC address trivially.

64-bit and 128-bit WEP are much better, (128 is not a huge amount better than 64 but worth having), but if an attacker can get access to about 500000 to one million packets from your network there is a good chance that the encryption can be cracked.

Really it depends how busy your network is, and if you see somebody standing nearby for a few hours looking suspicious ... :D

Change your WEP keys daily if you want to beef up security.

Paul.

Link to comment
Share on other sites

paul, i have to disagree there - WEP you only need about 5 or 10 minutes to crack if you have the right app off the web ;) And if your office is buiser, then its even easier as (another major flaw in the protocol) everyone uses the same key..

of course, i really shouldn't be risking being wrong again... but in this case i know it to be a fact!

Link to comment
Share on other sites

no - ians right on that one - as a security test our company changed the WEP key to 128bit & challenged us to crack it.

one guy cracked it in 30min

J

Link to comment
Share on other sites

it is somewhat embaressing though - considering what i do for a living!

:lol::lol:

I am upgrading a wireless install at the mo the wep key was 4 letters :lol::lol:

I knew you would have to comment! :rolleyes:

but thats funny! 4 letters! :lol::lol:

Knowing you though, theres gonna be a ACL firewall sat behind the access point though! :thumbsup:

Link to comment
Share on other sites

One thing that puzzles me with Wireless is the actual network key itself, where do you get that from? does it come with the products?

I'm talking about netgear ones also.. :unsure:

Link to comment
Share on other sites

No, thats actually fatal flaw #1 in WEP - which is the key is user generated - either through someone making it up - or a 'key generator' which takes a 'code word' and generates a WEP key from it...

The IT manager has to specifiy the key in the router, and then enter the key on all of the laptops so they can have wireless access - and of course, they need to keep a record of the key for new users... :rolleyes:

In real security protocols, you have specific software/hardware to generate a truely random key, which has to be a prime number and pass some distinct parameters before it is actually used.. and once you have generated the key, you exchange it securely, and it is only valid for that uni-directional connection for that session...

Link to comment
Share on other sites


I knew you would have to comment!  :rolleyes:

but thats funny! 4 letters!  :lol:  :lol:

Knowing you though, theres gonna be a ACL firewall sat behind the access point though!  :thumbsup:

Replaced it with a sonicwall wireless solution I have to say I am impressed integrates IEEE 802.11a/b/g via the main firewall via IPSEC vpn. I am using the sonicpoints and they are all POE. Using the firewalls intrusion prevention system if the sonicpoint is attacked it alerts you to the area being attacked :thumbsup: A it's tighter then a mouses ear :lol::lol:

Link to comment
Share on other sites

paul, i have to disagree there - WEP you only need about 5 or 10 minutes to crack if you have the right app off the web ;)  And if your office is buiser, then its even easier as (another major flaw in the protocol) everyone uses the same key..

I chose my words quite carefully, Fidgits :D

You really need to examine of the order of 1m packets to have a good chance of cracking the WEP keys. However, on a 10mbit 11b network with a packet size of approx 1KB, you could easily transfer 1m packets in less than half an hour.

Of course, you may get lucky and see enough weak packets in a few minutes.

However, on a home network you are very unlikely to see that kind of usage unless your machines are constantly gossiping ... which means an attacker would probably take a while to accumulate enough packets in order to crack the keys.

Paul.

Link to comment
Share on other sites

I havent  I still dont have a clue - its all letters and numbers to me!  :lol:

And thats what a WEP key is ;) !

I use WPA encription........more secure than WEP but it was a pain to set up ;) !

Link to comment
Share on other sites

paul, i have to disagree there - WEP you only need about 5 or 10 minutes to crack if you have the right app off the web ;)  And if your office is buiser, then its even easier as (another major flaw in the protocol) everyone uses the same key..

I chose my words quite carefully, Fidgits :D

You really need to examine of the order of 1m packets to have a good chance of cracking the WEP keys. However, on a 10mbit 11b network with a packet size of approx 1KB, you could easily transfer 1m packets in less than half an hour.

Of course, you may get lucky and see enough weak packets in a few minutes.

However, on a home network you are very unlikely to see that kind of usage unless your machines are constantly gossiping ... which means an attacker would probably take a while to accumulate enough packets in order to crack the keys.

Paul.

fair comment - although in general those weak packets are 'SYN, ACK and SYN-ACK's', which just happen to be the start of any TCP/IP flow, and in a HTTP session, you can have a hellva lot of them - but yes, your explination is sound - its more just general 'home surfing' lends itself to ease of cracking of the key more than corporate which tends to have a more balanced type of packet....

So there you go, we were both right - which is nice :D

:thumbsup:

Link to comment
Share on other sites

packet sniffer???

Basically its a tool which 'listens' to a network, whether a network cable, or listens for the specific 802.11 radio transmissions..

It then takes a 'copy' of the packet is see's...

think of it like someone 'tapping into a phone call' with a tape recorder - exactly the same principal...

Although the packets are encrypted, they can use them to work out the key.

Link to comment
Share on other sites

Latest Deals

Toyota Official Store for genuine Toyota parts & accessories

Disclaimer: As the club is an eBay Partner, The club may be compensated if you make a purchase via eBay links

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

 Share






×
×
  • Create New...




Forums


News


Membership


  • Insurance
  • Support