MAC Address Filtering With BT HomeHub2 ?

The best thing a home user can do is have a good WPA passphrase, use a random string generator or something obscure as WPA is still vulnerable to an offline brute force/dictionary attack.

Can the WiFi connection be configured to block all incoming requests for a period of 15 minutes after 3 failed connection attempts or something along those lines? Or, is there something about WiFi connectivity that excludes this type of approach?

If possible, would this negate any brute force attack in practice?


Rgds
Binty
 
I should have explained a bit better, what offline means is you just have to be around the network to capture the handshake packet when a client associates with a base station. Once you've got this you can go back to your underground layer/base inside a volcano and begin your dictionary attack. Capturing the handshake is very easy, then you just need patients while you try different passwords. I shouldnt of said brute force really as this will take thousands of years to computer, a dictionary attack is the main way of doing it.

Obviously if you have a long passphrase with mixed case letters, numbers and special characters the chances of a dictionary attack working are very slim.
 
Back
Top Bottom