wifi jacking

The only thing you really can do is have a long wpa pass key, anything else is just futile against anyone who knows what there doing. as already stated.
If your using linux you dont even need cracked drivers to put the card in monitor mode
 
mattbrown91 said:
Tbh, just use WPA and disable the SSID.

You can easily spoof a MAC address.

hiding the ssid is just as easy to get around. Easier in fact...just makes administration harder.
 
BillytheImpaler said:
Check your AP's DHCP list. It'll tell you all the clients that hold assigned IP addresses. Look to see if any of the machines listed are not yours.

I might be wrong on this but I'd imagine that after the initial DHCP connection, people piggybacking onto someone elses wireless would likely set a static ip so as to avoid showing up on DHCP lists.
 
hmmmm

all i use is mac filtering and ssid turned off.

Being hacked is not really an issue though, have an acre of garden space and no one close by who could connect lol :D

you would have to be in my garden to find it and if your sat in my garden i will want to know wtf your doing there anyways ;)

All gets shut down when away on hols.

WEP. WPA and such do decrease your network speed.

If you want fast performance and you dont have anything which must be secure on your network you can run with just mac filtering and ssid turned off. Just keep an eye on your router to see if anything else has connected.

My router DG834N also allows me to check machine names and such that are connected. so you could also use this.

Obviusly its not a good thing to do if you live in a block of flats or such lol.
 
Make sure you use a nice password with WPA or WPA2. Something like this:

j8!uN9WokicJfBzS\sp8yQH09v%VVFL5NAzlJKP%\#CX32z\ue2h\Jr35kYZ!te

63 characters,504 bits. Nice and secure.

If you're really paranoid, then change the key on a regular basis.
 
/thread necromancy on

been playing around with aircrack recently, managed to crack my wep key in 7 minutes on my zaurus c3200 pda with the ptw and arpreplay attack.
 
Yep > Wep is easy to crack as it broadcasts chunks of information (I think it's part of the Key + a hash) but it only has so many cycles before it starts repearting itself - hence 64 bit encryption is only 40bit key and 24 bit cycle - from what I remember the cycle is the same with WEP128. / edit - acutally the whole key is trasmitted 40 or 104 bit key and 24 bit vector (0>16,777,215 possable values)

WPA and WPA2 are pretty much of a much, WPA2 I think added 802.1x authentication and maybe AES to standard WPA - but I'd have to check my notes to confirm. / edit note's checked and it's only AES encryption 802.1x was supported in WPA

The key is never actually transmitted, it runs an calculation to generate keysets from the main key and then tags a huge cycle on the end (which I think is larger than the sub keys), all of this rotates and WPA is intelligent enough to pickup spoofing attempts and can block comms for 60 seconds to an intruder device (think it's done on a mac basis). /edit, there's a per session key and per-packet keys, per packet keys use a hash of the session key and some of the IV which is increased from 24 bits in WEP to 48 bits in WPA)

The important thing to know, is that WEP uses the same key per Wifi connection (One laptop, multiple browsers would use the same key information).
WPA/WPA 2 uses one key per session (that's a different key per every browser that's open and can actually rotate them at given intervals).

I'm pretty sure that the above is fairly acurate, but I'd have to check my notes and in my defence - it's fairly late! :p

Kev :)
 
Last edited:
with my ssid disabled my n95 finds nothing but as i set the connection up before i disabled it my n95 knows what the ssid etc is so connects ok. On another note. With my ssid disabled my media pc finds 'unknown' and i can connect to it when i enter the password
 
Back
Top Bottom