Software Blogs - BlogCatalog Blog Directory security wireless network: Planning Security

search motor

LINUX DISTRIBUTIONS

The most known is backtrack versions(3 and 4) i will use backtrack4 another distributions wifiaway,wifislax.,everyone of them its specialase in auditoria of wireless network with a lot of programas like: airodump-wireles network scanner aircrack-its use to crack wep pass wireshark-internet traffic escanner It is a simple 3 examples of 3 programs from linux distributions you ask me how did this work how a hacker can use this to penetrate my wireless network: first one we need to download backtrack4http://www.backtrack-linux.org/ this is the link were you can download any backtrack you wish,try with live cd you can install backtrack into your sistem using a virual machine like VMWARE http://www.vmware.com/ this is the oficial site of vmware you need to download wmware workstation 7 you can use 30 days this program afree if you will subscrib (its free)i will put a video on youtube about how to run backtrack4 in vmware its very simple to do this. The youtube movie its show you how can a hacker crack a wireless network(wep key). The second video its about how can you run backtrack4 in vmware its very simple

SNIFFING PROGRAMS

Once penetrade the network the hacker can use snnifing programs such as cain&abel, wireshark,to see the internet trafic into the network with the final goal to steal your passwords. For now i will present only this two programs: cain&abel-its a complex program how has a sniffing tool and a crack tool. The basic idea in the traffic interceptation is that the attacker is interposed between the router and pc atacked so that traffic passes to the attacker pc first and then go to the router,this is the basic idea.i will put an video on this program,one more thing-i use this program under windows. wireshark-its almoust the same tipe that the first one but in this you will need to process a huge cantitate of data.This one its cames with backtrack4 but also can you use under windows.

WHAT CAN WE DO?

As you can see the tools hackers are diverse and complex as I illustrated above and is only a small part of the multitude of ways that we can be attacked, I think we should show more interest in everything around us and especially to new Wireless technology is the future because I believe that the transmission and receipt of data. How can we defend against these attacks, I have some advice: -If you have a wireless router and its has an wep key to have acces change it into an wpa key(choose a key that is not into the dictionary -phone number f.g) -check if at yor network are conected other pc that you know it If you connect through a public Internet network try to keep on mind that someone can spy on you and he can see what password that you type so dont type important psswords(such paypal pass)

miércoles, 3 de marzo de 2010

Planning Security

Any network can be attacked by a persistent hacker, but a well-defended network
discourages most hackers sufficiently to keep your data safe. However,
it’s easier for a hacker to gain access through the air to a wireless network
than to gain physical access to a wired network, making wireless networks,
and even home networks, more vulnerable to attack. Because a Wi-Fi signal
is a radio signal, it keeps going and going and going, like ripples in a pond,
in a weaker and weaker form until it hits something solid enough to stop it.
Anyone with a portable PC, wireless network adapter, and an external antenna
in a van driving by your house, or even a neighbor with this equipment, has a
reasonable chance of accessing your wireless network. (Such skullduggery is
known as war driving.) So, you must plan for security. We give you all the
down-and-dirty details in Chapter 9, but here are some key things to keep
in mind:

Internet security: Any Internet connection — especially always-on broadband
connections, but dial-up connections, too — can be vulnerable to
attacks arriving from the Internet. To keep your PCs safe from the bad
folks (who may be thousands of miles away), you should turn on any firewall
features available in your AP or router. Some fancier APs or routers
include a highly effective kind of firewall (a stateful packet inspection [SPI]
firewall), but even just the basic firewall provided by any NAT router can
be quite effective. You should also consider installing antivirus software
as well as personal firewall software on each PC or Mac on your network
for an extra level of protection.
Airlink security: This is a special need of a wireless home network. Wired
networks can be made secure by what’s known as physical security. That
is, you literally lock your doors and windows, and no one can plug into
your wired network. In the wireless world, physical security is impossible
(you can’t wrangle those radio waves and keep them in the house), so
you need to implement airlink security. You can’t keep the radio waves
from getting out of the house, but you can make it hard for someone to
do anything with them (like read the data they contain). Similarly, you
can use airlink security to keep others from getting onto your access
point and freeloading on your Internet connection. The primary means
of providing airlink security — and advances are on the way — is called
WPA2 (Wi-Fi Protected Access). You absolutely should use WPA2

No hay comentarios:

 
Locations of visitors to this page
Nuestro blog en
casas madera y blogs
Reprezint Diaspora in recensamantul Bloggerilor Promoveaza-te pe acest blog
by HORAblogs