Protected WLAN

James McKenzie jjmckenzie51 at gmail.com
Wed May 18 03:22:34 UTC 2011


On 5/17/11 2:01 PM, JD wrote:
> On 05/17/11 12:23, Marko Vojinovic wrote:
>> On Tuesday 17 May 2011 19:47:24 JD wrote:
>>> On 05/17/11 11:23, Steve Searle wrote:
>>>> Around 07:16pm on Tuesday, May 17, 2011 (UK time), JD scrawled:
>>>>> Right. Also, it is not necessarily "neighbours" that are adjacent
>>>>> you your house or a few houses down. Someone can park a car
>>>>> not far from your house, and using the type of home-made antenna
>>>>> James mentioned, they can hack your network.
>>>>> I would strongly encourage you to use MAC address whitelist.
>>>> Because someone with the knowhow to make antenna like this and hack your
>>>> wireless password would have no idea how to spoof mac addresses?
>>>>
>>>> Steve
>>> It just reduces the number of would be hackers to those
>>> with the knowhow. And the probability that such
>>> knowledgeable hackers being near your vicinity is much
>>> less than the casual hackers without such knowledge.
>>> In network security, even the simplest measures should
>>> not be dropped just because there are those with the tools
>>> and the knowhow to hack it. It's like saying No need to lock
>>> your car because the door can easily be opened by an
>>> expert carthief.
>> Oh, come on, it took me cca 20 minutes to go from being an absolute noob to
>> being able to crack my own network. It requires reading through one web page
>> and four man pages.
>>
>>>  From man aireplay-ng:
>> -h<smac>
>>          Set source MAC address.
>>
>> Read the output of airodump-ng for a MAC address of an already connected
>> client to find one that is allowed by the access point firewall. How much of an
>> expert one needs to be to use an option switch in a command?
>>
>> Really, people typically have no idea how easy it is to crack a wireless until
>> they actually try it, at least once. After that, one gets to appreciate what
>> is really a security measure, and what is the "please don't open me" sign on
>> the door.
>>
>> MAC spoofing is trivial. Even in Windows there is a field to type a desired MAC
>> somewhere in the network settings...
>>
>> Best, :-)
>> Marko
>>
> Too much bluster here.
> Show us any credible publication
> that claims wpa2-ps/AES has been easily cracked
> or even cracked at all.
>
JD:

As far as I can discover, it has not been.  DES has and 3DES is in 
danger of being broken (however it offers many permutations of the 
two/three key combination.)

James McKenzie



More information about the users mailing list