Software Blogs - BlogCatalog Blog Directory security wireless network: Installing Wireless Access Points in Windows

search motor

LINUX DISTRIBUTIONS

The most known is backtrack versions(3 and 4) i will use backtrack4 another distributions wifiaway,wifislax.,everyone of them its specialase in auditoria of wireless network with a lot of programas like: airodump-wireles network scanner aircrack-its use to crack wep pass wireshark-internet traffic escanner It is a simple 3 examples of 3 programs from linux distributions you ask me how did this work how a hacker can use this to penetrate my wireless network: first one we need to download backtrack4http://www.backtrack-linux.org/ this is the link were you can download any backtrack you wish,try with live cd you can install backtrack into your sistem using a virual machine like VMWARE http://www.vmware.com/ this is the oficial site of vmware you need to download wmware workstation 7 you can use 30 days this program afree if you will subscrib (its free)i will put a video on youtube about how to run backtrack4 in vmware its very simple to do this. The youtube movie its show you how can a hacker crack a wireless network(wep key). The second video its about how can you run backtrack4 in vmware its very simple

SNIFFING PROGRAMS

Once penetrade the network the hacker can use snnifing programs such as cain&abel, wireshark,to see the internet trafic into the network with the final goal to steal your passwords. For now i will present only this two programs: cain&abel-its a complex program how has a sniffing tool and a crack tool. The basic idea in the traffic interceptation is that the attacker is interposed between the router and pc atacked so that traffic passes to the attacker pc first and then go to the router,this is the basic idea.i will put an video on this program,one more thing-i use this program under windows. wireshark-its almoust the same tipe that the first one but in this you will need to process a huge cantitate of data.This one its cames with backtrack4 but also can you use under windows.

WHAT CAN WE DO?

As you can see the tools hackers are diverse and complex as I illustrated above and is only a small part of the multitude of ways that we can be attacked, I think we should show more interest in everything around us and especially to new Wireless technology is the future because I believe that the transmission and receipt of data. How can we defend against these attacks, I have some advice: -If you have a wireless router and its has an wep key to have acces change it into an wpa key(choose a key that is not into the dictionary -phone number f.g) -check if at yor network are conected other pc that you know it If you connect through a public Internet network try to keep on mind that someone can spy on you and he can see what password that you type so dont type important psswords(such paypal pass)

miércoles, 3 de marzo de 2010

Installing Wireless Access Points in Windows

We talk about both types of WPA2 in much greater detail in Chapter 9.
WPA2 Enterprise is, frankly, overkill for the home environment and much
more difficult to set up. We recommend that you use WPA2 Personal
instead — it gets you 99 percent of the way there in terms of security
and is much easier to set up and configure.
WEP keys: You should always use some security on your wireless network,
and if your network cannot support WPA, you should use, at minimum,
Wired Equivalent Privacy (WEP) encryption. Only a determined
hacker with the proper equipment and software can crack the key. If you
don’t use WEP or some other form of security, any nosy neighbor with a
laptop, wireless PC Card, and range-extender antenna may be able to see
and access your wireless home network. Whenever you use encryption,
all wireless stations in your house attached to the wireless home network
must use the same key. Sometimes the AP manufacturer assigns a
default WEP key. Always assign a new key to avoid a security breach.
Read Chapter 9 for great background info on WEP and WPA2.
WPS: Wi-Fi Protected Security works with WPA2 and makes it considerably
easier to set up WPA2 security on your network by automating the
process. As we discuss in Chapter 9, you can implement WPS in two
ways:
• PIN code: You can turn on WPA2 by simply entering a PIN code
printed on your Wi-Fi hardware (usually on a label).
• Pushbutton: You can press a button on your Wi-Fi router (a physical
button or a virtual button on a screen on the router). When the
button is pushed, your devices can automatically connect to the
router and automatically configure WPA2 in 2 minutes. Simply push
the button(s) and let things set themselves up with no further
intervention.
Username and password: Configuration software may require that you
enter a password to make changes to the AP setup. The manufacturer
may provide a default username and password (see the user documentation).
Use the default password when you first open the configuration
pages, and then immediately change the password to avoid a security
breach. (Note: This isn’t the same as the WPA2 shared key, which is also
called a password by some user interfaces.) Make sure that you use a
password you can remember and that you don’t have to write down.
Writing down a password is the same as putting a sign on the equipment
that says “Here’s how you hack into me.” If you ever lose the password,
you can always reset a device to its factory configuration and get back
to the point where you took it out of the box.
MAC address: The Media Access Control (MAC) address is the physical
address of the radio in the AP. This number is printed on a label attached
to the device. You may need to know this value for troubleshooting, so
write it down. The AP’s Ethernet (RJ-45) connection to the wired network
also has a MAC address that’s different from the MAC address of the AP’s
radio.
Dynamic or static wide area network (WAN) IP address: If your network
is connected to the Internet, it must have an IP address assigned
by your ISP. Most often, your ISP dynamically assigns this address. Your
router or Internet gateway should be configured to accept an IP address
dynamically assigned by a DHCP server. It’s possible, but unlikely, that
your ISP will require a set (static) IP address.
Local IP address: In addition to a physical address (the MAC address),
the AP also has its own network (IP) address. You need to know this IP
address to access the configuration pages by using a Web browser. Refer
to the product documentation to determine this IP address. In most cases,
the IP address is 192.168.xxx.xxx, where xxx is between 1 and 254. It’s also
possible that an AP could choose a default IP that’s in use by your cable
or DSL router (or a computer that got its IP from the cable or DSL
router’s DHCP server). Either way, if an IP conflict arises, you may have
to keep the AP and cable or DSL routers on separate networks while
configuring the AP
Subnet mask: In most cases, this value is set at the factory to
255.255.255.0. If you’re using an IP addressing scheme of the type
described in the preceding paragraph, 255.255.255.0 is the correct
number to use. This number, together with the IP address, establishes
the subnet on which this AP will reside. Network devices with addresses
on the same subnet can communicate directly without the aid of a
router. You really don’t need to understand how the numbering scheme
works except to know that the AP and all the wireless devices that will
access your wireless network must have the same subnet mask.
PPPoE: Many DSL ISPs still use Point-to-Point Protocol over Ethernet
(PPPoE). The values you need to record are the username (or user ID)
and password. The DSL provider uses PPPoE as a means of identifying and
authorizing users.

1 comentario:

Point to point broadband wireless dijo...

Hey i think of your blog is pretty - i found it pleasant in google and I put on my list of favorites would like to see more posts from u soon.

 
Locations of visitors to this page
Nuestro blog en
casas madera y blogs
Reprezint Diaspora in recensamantul Bloggerilor Promoveaza-te pe acest blog
by HORAblogs