Software Blogs - BlogCatalog Blog Directory security wireless network: Wireless Networking Fundamentals

search motor

LINUX DISTRIBUTIONS

The most known is backtrack versions(3 and 4) i will use backtrack4 another distributions wifiaway,wifislax.,everyone of them its specialase in auditoria of wireless network with a lot of programas like: airodump-wireles network scanner aircrack-its use to crack wep pass wireshark-internet traffic escanner It is a simple 3 examples of 3 programs from linux distributions you ask me how did this work how a hacker can use this to penetrate my wireless network: first one we need to download backtrack4http://www.backtrack-linux.org/ this is the link were you can download any backtrack you wish,try with live cd you can install backtrack into your sistem using a virual machine like VMWARE http://www.vmware.com/ this is the oficial site of vmware you need to download wmware workstation 7 you can use 30 days this program afree if you will subscrib (its free)i will put a video on youtube about how to run backtrack4 in vmware its very simple to do this. The youtube movie its show you how can a hacker crack a wireless network(wep key). The second video its about how can you run backtrack4 in vmware its very simple

SNIFFING PROGRAMS

Once penetrade the network the hacker can use snnifing programs such as cain&abel, wireshark,to see the internet trafic into the network with the final goal to steal your passwords. For now i will present only this two programs: cain&abel-its a complex program how has a sniffing tool and a crack tool. The basic idea in the traffic interceptation is that the attacker is interposed between the router and pc atacked so that traffic passes to the attacker pc first and then go to the router,this is the basic idea.i will put an video on this program,one more thing-i use this program under windows. wireshark-its almoust the same tipe that the first one but in this you will need to process a huge cantitate of data.This one its cames with backtrack4 but also can you use under windows.

WHAT CAN WE DO?

As you can see the tools hackers are diverse and complex as I illustrated above and is only a small part of the multitude of ways that we can be attacked, I think we should show more interest in everything around us and especially to new Wireless technology is the future because I believe that the transmission and receipt of data. How can we defend against these attacks, I have some advice: -If you have a wireless router and its has an wep key to have acces change it into an wpa key(choose a key that is not into the dictionary -phone number f.g) -check if at yor network are conected other pc that you know it If you connect through a public Internet network try to keep on mind that someone can spy on you and he can see what password that you type so dont type important psswords(such paypal pass)

miércoles, 3 de marzo de 2010

Wireless Networking Fundamentals

Transmission Control Protocol/Internet Protocol (TCP/IP) is the most common
protocol for transmitting packets around a network. Every computer on a
TCP/IP network must have its own IP address, which is a 32-bit numeric
address that’s written as four groups of numbers separated by periods
(for example, 192.168.1.100). Each number of these four sets of numbers is
known as an octet, which can have a value from 0 to 255. The Internet transmits
packets by using the TCP/IP protocol. When you use the Internet, the
Internet service provider (ISP) — such as AOL, EarthLink, or your cable or
DSL provider — assigns a unique TCP/IP number to your computer. For the
period that your computer is connected, your computer “leases” this unique
address and uses it like a postal address to send and receive information
over the Internet to and from other computers.
A router with the Network Address Translation (NAT) feature also helps to
protect the data on your computers from intruders. The NAT feature acts as
a protection because it hides the real network addresses of networked computers
from computers outside the network. Many WAN routers also have
additional security features that more actively prevent intruders from gaining
unauthorized access to your network through the Internet. This type of protection
is sometimes described generically as a firewall. Good firewall software
usually offers a suite of tools that not only block unauthorized access
but also help you to detect and monitor suspicious computer activity. In
addition, these tools provide you with ways to safely permit computers on
your network to access the Internet.

Internet gateways

These days, you can get a device that really does it all: a wireless Internet gateway.
These devices combine all the features of an access point, a router, and
a broadband modem (typically, cable or DSL, but this could also be a fiberoptic
connection such as Verizon’s FiOS or even another wireless connection).
Some wireless Internet gateways even include a print server (which
enables you to connect a printer directly to the gateway and use it from any
networked PC), a dial-up modem, and even some Ethernet ports for computers
and devices that connect to your network with wires.
For example, the Motorola Netopia MiAVo Series Gateways (www.netopia.com)
include a built-in DSL modem, a router, a wireless access point, and other networking
features such as a firewall and an easy-to-use graphical user interface
(GUI) for configuring and setting up the gateway.
Not many of these devices are on the market; you can’t buy many of them offthe-
shelf, but you can get them directly from your broadband service provider.
The term gateway gets used a lot by different folks with different ideas about
what such a device is. Although our definition is the most common (and, in
our opinion, correct), you may see some vendors selling devices that they
call Internet gateways that don’t have all the functions we describe.

No hay comentarios:

 
Locations of visitors to this page
Nuestro blog en
casas madera y blogs
Reprezint Diaspora in recensamantul Bloggerilor Promoveaza-te pe acest blog
by HORAblogs