Software Blogs - BlogCatalog Blog Directory security wireless network: Installing the AP

search motor

LINUX DISTRIBUTIONS

The most known is backtrack versions(3 and 4) i will use backtrack4 another distributions wifiaway,wifislax.,everyone of them its specialase in auditoria of wireless network with a lot of programas like: airodump-wireles network scanner aircrack-its use to crack wep pass wireshark-internet traffic escanner It is a simple 3 examples of 3 programs from linux distributions you ask me how did this work how a hacker can use this to penetrate my wireless network: first one we need to download backtrack4http://www.backtrack-linux.org/ this is the link were you can download any backtrack you wish,try with live cd you can install backtrack into your sistem using a virual machine like VMWARE http://www.vmware.com/ this is the oficial site of vmware you need to download wmware workstation 7 you can use 30 days this program afree if you will subscrib (its free)i will put a video on youtube about how to run backtrack4 in vmware its very simple to do this. The youtube movie its show you how can a hacker crack a wireless network(wep key). The second video its about how can you run backtrack4 in vmware its very simple

SNIFFING PROGRAMS

Once penetrade the network the hacker can use snnifing programs such as cain&abel, wireshark,to see the internet trafic into the network with the final goal to steal your passwords. For now i will present only this two programs: cain&abel-its a complex program how has a sniffing tool and a crack tool. The basic idea in the traffic interceptation is that the attacker is interposed between the router and pc atacked so that traffic passes to the attacker pc first and then go to the router,this is the basic idea.i will put an video on this program,one more thing-i use this program under windows. wireshark-its almoust the same tipe that the first one but in this you will need to process a huge cantitate of data.This one its cames with backtrack4 but also can you use under windows.

WHAT CAN WE DO?

As you can see the tools hackers are diverse and complex as I illustrated above and is only a small part of the multitude of ways that we can be attacked, I think we should show more interest in everything around us and especially to new Wireless technology is the future because I believe that the transmission and receipt of data. How can we defend against these attacks, I have some advice: -If you have a wireless router and its has an wep key to have acces change it into an wpa key(choose a key that is not into the dictionary -phone number f.g) -check if at yor network are conected other pc that you know it If you connect through a public Internet network try to keep on mind that someone can spy on you and he can see what password that you type so dont type important psswords(such paypal pass)

jueves, 4 de marzo de 2010

Installing the AP

If you’re connecting your first computer with your ISP, the ISP should have
supplied you with all the information we list in the preceding section except
for the physical address of the network card (which isn’t needed if you aren’t
already connected).
Before you install your wireless gear, buy a 100-foot Ethernet cable. If you’re
installing your AP at a distance farther than that from your router or Internetsharing
PC, get a longer cable. Trust us: This advice comes with having done
this a lot. You need a wired backup to your system to test devices and debug
problems. To do that (unless you want to keep moving your gear around,
which we don’t recommend), you need a long cable. Or two. Anyone with a
home network should have extra cables, just like you have electrical extension
cords around the house. You can get good-quality 100-foot CAT-5e/6
patch cables online at places like Deep Surplus (www.deepsurplus.com) or
a host of other online retailers for around $15.
When you’re ready to do the AP installation, follow these steps:
1. Gather the necessary information for installing the AP (see the preceding
bulleted list) by following these steps:
In Windows XP:
a. Choose Start➪Programs➪Accessories➪Command Prompt.
This step brings up the command prompt window, which is a DOS
screen.
b. Type IPCONFIG /ALL and then press Enter.
The information scrolls down the screen. Use the scroll bar to slide
up to the top and write down the networking information we list
earlier in this chapter (physical address, IP address, default gateway,
subnet mask, DNS servers) and whether DHCP is enabled. You
use this information to configure the AP in Step 4.
In Windows Vista:
a. Choose Start➪Network➪Network and Sharing Center.
The Network and Sharing Center appears, which gives you access
to all network adapters and their properties.
From the Network and Sharing Center, click the View Status link.
A pop-up status window appears with all the information you need.
2. Run the setup software that accompanies the AP or device containing
your AP, like a wireless or Internet gateway.
The software probably starts when you insert its CD-ROM into the CD
drive. In many cases, this software detects your Internet settings, which
makes it much easier to configure the AP for Internet sharing and to configure
the first computer on the network. For example, Figure 6-1 shows
the Linksys Wireless-G Setup Wizard that accompanies the Linksys
WAP54G Wireless-G Access Point, which is a wireless gateway from
Linksys, a division of Cisco Systems, Inc.
If your computer is using Windows Vista, you will see a lot of security
dialog box pop-ups. The enhanced security in Vista asks for your permission
every time the installation software tries to do anything. As long
as you have administration rights on your user account, you can keep
saying yes to these security pop-ups and move through your AP setup.
Be sure to look at the top left of the pop-up window so you know when
you are saying yes to a security warning and when you are saying yes to
the install. Even though Vista dims the rest of the screen when a security
warning pops up, it is confusing with the number of pop-ups you can run
into. Just read the top left of the window and you will always know what
you are working in.
3. When you’re prompted by the setup software to connect the AP unplug the network cable that connects the broadband
modem to your computer’s Ethernet port and plug this cable into the
Ethernet port that’s marked WAN or Modem on your network’s cable
or DSL router or Internet gateway.
If you’re using an Internet or wireless gateway, run a CAT-5e/6 cable from
one of its Ethernet ports to the computer on which you’re running the
setup software. (CAT-5e/6 cable is a standard Ethernet cable or patch
cord with what look like oversized phone jacks on each end. You can
pick one up at any computer store or Radio Shack.)
If you’re using a separate AP and router (in other words, if your AP is not
your router), you need to connect a CAT-5e/6 cable between the AP and
one of the router’s Ethernet ports. Then connect another cable from
another one of the router’s Ethernet ports to the computer on which
you’re running the setup software.
Most new APs try to obtain an IP address automatically and configure
themselves for you by choosing the channel and setting default parameters
for everything else. In most cases, you need to manually
configure the security and some of the other information you
collected in Step 1 (so have that information handy).
4. Record the following access point parameters:
• Service set identifier (SSID)
• Channel — if you’re using an 802.11n draft 2 AP, this should be set
to Auto
• WEP key or WPA2 passphrase (see Chapter 9 for more details on
this subject), if your system doesn’t use WPS
• Router pin, if your system does use WPS (again, see Chapter 9 for
more details on Wi-Fi Protected Setup)
• Admin username and password

2 comentarios:

Anónimo dijo...

St.Paul Minneapolis security provider installs, services, and monitors residential and commercial security systems.State of the art technology, with the best installers and monitoring the State of Minnesota has to offer.
Lloyd Security Minneapolis Security provider,Commercial security systems,Edina Alarm,
Home security companies MNMinneapolis Home Security Systems

Anónimo dijo...

State of the art technology, with the best installers and monitoring the State of Minnesota has to offer. Lloyd SecurityWireless Home Security Systems, Commercial security systems, No phone line security system, Minnetonka home security, Minneapolis Security provider
Minneapolis Home Security Systems

 
Locations of visitors to this page
Nuestro blog en
casas madera y blogs
Reprezint Diaspora in recensamantul Bloggerilor Promoveaza-te pe acest blog
by HORAblogs