Software Blogs - BlogCatalog Blog Directory security wireless network: Choosing Wireless Home Networking Equipment

search motor

LINUX DISTRIBUTIONS

The most known is backtrack versions(3 and 4) i will use backtrack4 another distributions wifiaway,wifislax.,everyone of them its specialase in auditoria of wireless network with a lot of programas like: airodump-wireles network scanner aircrack-its use to crack wep pass wireshark-internet traffic escanner It is a simple 3 examples of 3 programs from linux distributions you ask me how did this work how a hacker can use this to penetrate my wireless network: first one we need to download backtrack4http://www.backtrack-linux.org/ this is the link were you can download any backtrack you wish,try with live cd you can install backtrack into your sistem using a virual machine like VMWARE http://www.vmware.com/ this is the oficial site of vmware you need to download wmware workstation 7 you can use 30 days this program afree if you will subscrib (its free)i will put a video on youtube about how to run backtrack4 in vmware its very simple to do this. The youtube movie its show you how can a hacker crack a wireless network(wep key). The second video its about how can you run backtrack4 in vmware its very simple

SNIFFING PROGRAMS

Once penetrade the network the hacker can use snnifing programs such as cain&abel, wireshark,to see the internet trafic into the network with the final goal to steal your passwords. For now i will present only this two programs: cain&abel-its a complex program how has a sniffing tool and a crack tool. The basic idea in the traffic interceptation is that the attacker is interposed between the router and pc atacked so that traffic passes to the attacker pc first and then go to the router,this is the basic idea.i will put an video on this program,one more thing-i use this program under windows. wireshark-its almoust the same tipe that the first one but in this you will need to process a huge cantitate of data.This one its cames with backtrack4 but also can you use under windows.

WHAT CAN WE DO?

As you can see the tools hackers are diverse and complex as I illustrated above and is only a small part of the multitude of ways that we can be attacked, I think we should show more interest in everything around us and especially to new Wireless technology is the future because I believe that the transmission and receipt of data. How can we defend against these attacks, I have some advice: -If you have a wireless router and its has an wep key to have acces change it into an wpa key(choose a key that is not into the dictionary -phone number f.g) -check if at yor network are conected other pc that you know it If you connect through a public Internet network try to keep on mind that someone can spy on you and he can see what password that you type so dont type important psswords(such paypal pass)

miércoles, 3 de marzo de 2010

Choosing Wireless Home Networking Equipment

Access Point Selection

• WPA/WPA2 Enterprise: This business-oriented variant of WPA
provides the ability to use a special 802.1x or RADIUS server
(explained in Chapter 9) to manage users on the network. For
the vast majority of wireless home networkers, this capability is
overkill, but it doesn’t hurt to have it (any WPA/WPA2 Enterprise
certified system also supports WPA/WPA2 Personal).
Other certifications: The Wi-Fi Alliance provides a number of other specialized
certifications that not all Wi-Fi certified gear will have earned,
like the following:
• WMM: Wi-Fi Multimedia certification can be found on a growing
number of audio/video and voice Wi-Fi equipment (these items
are discussed in Chapters 12 and 13, respectively). WMM certified
equipment can provide on your wireless LAN some Quality of
Service (QoS), which can give your voice, video, or audio data
priority over other data being sent across your network. We talk
about WMM where appropriate in Chapters 12 and 13.
• WPS: Wi-Fi Protected Setup certification is increasingly common on
new equipment, but still rather new as we write this. WPS, which
we discuss in detail in Chapter 9, is a user-friendly front end to
WPA2 Personal, and allows you to set up network security simply
by pushing buttons (or entering preassigned PIN codes) on your
AP/router and network clients.
• EAP: Extensible Authentication Protocol is part of the WPA
Enterprise/802.1x system used in business wireless LANs — EAP
provides the mechanism for authenticating users (or confirming
that they are who they say they are). A number of different EAP
types can be used with WPA Enterprise — each type can be certified
by the Wi-Fi Alliance. You don’t need to worry about this
unless you’re building a WPA Enterprise security system for your
network.

Servers,Gateways, Routers, and Switches
DHCP servers
To create an easy-to-use home network, your network should have a Dynamic
Host Configuration Protocol (DHCP) server. A DHCP server dynamically assigns
an IP address to each computer or other device on your network. This function
relieves you from having to keep track of all the devices on the network and
assign addresses to each one manually.
Network addresses are necessary for the computers and other devices on
your network to communicate. Because most networks now use a set of protocols
(Transmission Control Protocol/Internet Protocol, or TCP/IP) with
network addresses (Internet Protocol, or IP, addresses), we refer to network
addresses as IP addresses in this book. In fact, the Internet uses the TCP/IP
protocols, and every computer connected to the Internet must be identified
by an IP address.

NAT and broadband routers

A wireless router is a wireless AP that enables multiple computers to share
the same IP address on the Internet. This fact would seem to be a contradiction
because every computer on the Internet needs its own IP address.
The magic that makes an Internet gateway possible is Network Address
Translation (NAT). Most access points you buy now are wireless gateways.
Vendors sometimes call these wireless routers wireless broadband routers or
perhaps wireless cable/DSL routers. What you’re looking for is the word router
somewhere in the name or description of the device itself. Stand-alone access
points (without the router functionality) usually are called just an access
point, so sometimes it’s easier to look for something not called that!
In addition to providing NAT services, the wireless routers used in home
networks also provide the DHCP service. The router communicates with
each computer or other device on your home network via private IP
addresses — the IP addresses assigned by the DHCP server. (See the section
“DHCP servers,” earlier in this chapter.) However, the router uses a single IP
address — the one assigned by your ISP’s DHCP server — in packets of data
intended for the Internet.

Switches

Wireless routers, available from nearly any manufacturer, include from one to
eight Ethernet ports with which you can connect computers or other devices
via Ethernet cables. These routers are not only wireless APs but are also wired
switches that efficiently enable all the computers on your network to communicate
either wirelessly or over Ethernet cables.
Make sure that the switch ports support at least 100BaseT Ethernet — this is
the 100 Mbps variant of Ethernet. You should also ensure that the switch
supports the full-duplex variant of 100BaseT — meaning that it supports 100
Mbps of data in both directions at the same time. If you’re looking for the ultimate
in performance, you should strongly consider paying a bit more for a
router that supports Gigabit Ethernet (1000BaseT)

No hay comentarios:

 
Locations of visitors to this page
Nuestro blog en
casas madera y blogs
Reprezint Diaspora in recensamantul Bloggerilor Promoveaza-te pe acest blog
by HORAblogs