Protected WLAN

JD jd1008 at gmail.com
Tue May 17 21:01:11 UTC 2011


On 05/17/11 12:23, Marko Vojinovic wrote:
> On Tuesday 17 May 2011 19:47:24 JD wrote:
>> On 05/17/11 11:23, Steve Searle wrote:
>>> Around 07:16pm on Tuesday, May 17, 2011 (UK time), JD scrawled:
>>>> Right. Also, it is not necessarily "neighbours" that are adjacent
>>>> you your house or a few houses down. Someone can park a car
>>>> not far from your house, and using the type of home-made antenna
>>>> James mentioned, they can hack your network.
>>>> I would strongly encourage you to use MAC address whitelist.
>>> Because someone with the knowhow to make antenna like this and hack your
>>> wireless password would have no idea how to spoof mac addresses?
>>>
>>> Steve
>> It just reduces the number of would be hackers to those
>> with the knowhow. And the probability that such
>> knowledgeable hackers being near your vicinity is much
>> less than the casual hackers without such knowledge.
>> In network security, even the simplest measures should
>> not be dropped just because there are those with the tools
>> and the knowhow to hack it. It's like saying No need to lock
>> your car because the door can easily be opened by an
>> expert carthief.
> Oh, come on, it took me cca 20 minutes to go from being an absolute noob to
> being able to crack my own network. It requires reading through one web page
> and four man pages.
>
> > From man aireplay-ng:
>
> -h<smac>
>         Set source MAC address.
>
> Read the output of airodump-ng for a MAC address of an already connected
> client to find one that is allowed by the access point firewall. How much of an
> expert one needs to be to use an option switch in a command?
>
> Really, people typically have no idea how easy it is to crack a wireless until
> they actually try it, at least once. After that, one gets to appreciate what
> is really a security measure, and what is the "please don't open me" sign on
> the door.
>
> MAC spoofing is trivial. Even in Windows there is a field to type a desired MAC
> somewhere in the network settings...
>
> Best, :-)
> Marko
>
Too much bluster here.
Show us any credible publication
that claims wpa2-ps/AES has been easily cracked
or even cracked at all.




More information about the users mailing list