Software Blogs - BlogCatalog Blog Directory security wireless network: Network infrastructure

search motor

LINUX DISTRIBUTIONS

The most known is backtrack versions(3 and 4) i will use backtrack4 another distributions wifiaway,wifislax.,everyone of them its specialase in auditoria of wireless network with a lot of programas like: airodump-wireles network scanner aircrack-its use to crack wep pass wireshark-internet traffic escanner It is a simple 3 examples of 3 programs from linux distributions you ask me how did this work how a hacker can use this to penetrate my wireless network: first one we need to download backtrack4http://www.backtrack-linux.org/ this is the link were you can download any backtrack you wish,try with live cd you can install backtrack into your sistem using a virual machine like VMWARE http://www.vmware.com/ this is the oficial site of vmware you need to download wmware workstation 7 you can use 30 days this program afree if you will subscrib (its free)i will put a video on youtube about how to run backtrack4 in vmware its very simple to do this. The youtube movie its show you how can a hacker crack a wireless network(wep key). The second video its about how can you run backtrack4 in vmware its very simple

SNIFFING PROGRAMS

Once penetrade the network the hacker can use snnifing programs such as cain&abel, wireshark,to see the internet trafic into the network with the final goal to steal your passwords. For now i will present only this two programs: cain&abel-its a complex program how has a sniffing tool and a crack tool. The basic idea in the traffic interceptation is that the attacker is interposed between the router and pc atacked so that traffic passes to the attacker pc first and then go to the router,this is the basic idea.i will put an video on this program,one more thing-i use this program under windows. wireshark-its almoust the same tipe that the first one but in this you will need to process a huge cantitate of data.This one its cames with backtrack4 but also can you use under windows.

WHAT CAN WE DO?

As you can see the tools hackers are diverse and complex as I illustrated above and is only a small part of the multitude of ways that we can be attacked, I think we should show more interest in everything around us and especially to new Wireless technology is the future because I believe that the transmission and receipt of data. How can we defend against these attacks, I have some advice: -If you have a wireless router and its has an wep key to have acces change it into an wpa key(choose a key that is not into the dictionary -phone number f.g) -check if at yor network are conected other pc that you know it If you connect through a public Internet network try to keep on mind that someone can spy on you and he can see what password that you type so dont type important psswords(such paypal pass)

miércoles, 3 de marzo de 2010

Network infrastructure

Workstations must be electronically interconnected to communicate. The
equipment over which the network traffic (electronic signals) travels
between computers on the network is the network infrastructure.

Network hubs

In a typical office network, a strand of wiring similar to phone cable is run
from each computer to a central location, such as a phone closet, where each
wire is connected to a network hub. The network hub, similar conceptually
to the hub of a wheel, receives signals transmitted by each computer on the
network and sends the signals out to all other computers on the network.
Figure 2-1 illustrates a network with a star-shaped topology (the physical
design of a network). Other network topologies include ring and bus. Home
networks typically use a star topology because it’s the simplest to install and
troubleshoot.

Bridges

A network bridge provides a pathway for network traffic between networks or
segments of networks. A device that connects a wireless network segment to
a wired network segment is a type of network bridge. In larger networks, network
bridges are sometimes used to connect networks on different floors in
the same building or in different buildings. In a wireless home network, the
device that manages the wireless network, the access point, often acts as a
bridge between a wireless segment of the network and a wired segment.
Hubs and switches
Networks transmit data in bundles called packets. Along with the raw information
being transmitted, each packet also contains the network address of
the computer that sent it and the network address of the recipient computer.
Network hubs send packets indiscriminately to all ports of all computers connected
to the hub — which is why you don’t see them much any longer.
A special type of hub called a switched hub examines each packet, determines
the addressee and port, and forwards the packet only to the computer and
port to which it is addressed. Most often, switched hubs are just called
switches. A switch reads the addressee information in each packet and sends
the packet directly to the segment of the network to which the addressee is
connected. Packets that aren’t addressed to a particular network segment are
never transmitted over that segment, and the switch acts as a filter to eliminate
unnecessary network traffic. Switches make more efficient use of the
available transmission bandwidth than standard hubs, and therefore offer
higher aggregate throughput to the devices on the switched network.

Routers

Over a large network and on the Internet, a router is analogous to a superefficient
postal service — it reads the addressee information in each data packet
and communicates with other routers over the network or Internet to determine
the best route for each packet to take. In the home, a home or broadband
router uses a capability called Network Address Translation (NAT) to enable all
the computers on a home network to share a single Internet address on the
cable or DSL network. The home router sits between your broadband modem
and all the computers and networked devices in your house, and directs traffic
to and from devices both within the network and out on the Internet.
So, the local area network in your home connects to the wide area network,
which takes signals out of the home and on to the Internet.

No hay comentarios:

 
Locations of visitors to this page
Nuestro blog en
casas madera y blogs
Reprezint Diaspora in recensamantul Bloggerilor Promoveaza-te pe acest blog
by HORAblogs