Software Blogs - BlogCatalog Blog Directory security wireless network: Planning Security

search motor

LINUX DISTRIBUTIONS

The most known is backtrack versions(3 and 4) i will use backtrack4 another distributions wifiaway,wifislax.,everyone of them its specialase in auditoria of wireless network with a lot of programas like: airodump-wireles network scanner aircrack-its use to crack wep pass wireshark-internet traffic escanner It is a simple 3 examples of 3 programs from linux distributions you ask me how did this work how a hacker can use this to penetrate my wireless network: first one we need to download backtrack4http://www.backtrack-linux.org/ this is the link were you can download any backtrack you wish,try with live cd you can install backtrack into your sistem using a virual machine like VMWARE http://www.vmware.com/ this is the oficial site of vmware you need to download wmware workstation 7 you can use 30 days this program afree if you will subscrib (its free)i will put a video on youtube about how to run backtrack4 in vmware its very simple to do this. The youtube movie its show you how can a hacker crack a wireless network(wep key). The second video its about how can you run backtrack4 in vmware its very simple

SNIFFING PROGRAMS

Once penetrade the network the hacker can use snnifing programs such as cain&abel, wireshark,to see the internet trafic into the network with the final goal to steal your passwords. For now i will present only this two programs: cain&abel-its a complex program how has a sniffing tool and a crack tool. The basic idea in the traffic interceptation is that the attacker is interposed between the router and pc atacked so that traffic passes to the attacker pc first and then go to the router,this is the basic idea.i will put an video on this program,one more thing-i use this program under windows. wireshark-its almoust the same tipe that the first one but in this you will need to process a huge cantitate of data.This one its cames with backtrack4 but also can you use under windows.

WHAT CAN WE DO?

As you can see the tools hackers are diverse and complex as I illustrated above and is only a small part of the multitude of ways that we can be attacked, I think we should show more interest in everything around us and especially to new Wireless technology is the future because I believe that the transmission and receipt of data. How can we defend against these attacks, I have some advice: -If you have a wireless router and its has an wep key to have acces change it into an wpa key(choose a key that is not into the dictionary -phone number f.g) -check if at yor network are conected other pc that you know it If you connect through a public Internet network try to keep on mind that someone can spy on you and he can see what password that you type so dont type important psswords(such paypal pass)

miércoles, 3 de marzo de 2010

Planning Security

Unless you work for the government or handle sensitive data on your computer,
you probably aren’t overly concerned about the privacy of the information
stored on your home network. Usually it’s not an issue anyway because
someone would have to break into your house to access your network. But if
you have a wireless network, the radio signals transmitted by your network
don’t automatically stop at the outside walls of your house. In fact, a neighbor
or even someone driving by on the street in front of your house can use
a computer and a wireless networking adapter to grab information right off
your computer, including deleting your files, inserting viruses, and using your
computer to send spam — unless you take steps to protect your network.
The original security technology for Wi-Fi equipment was Wired Equivalent
Privacy (WEP). Perhaps the most well-publicized aspect of Wi-Fi wireless networking
is the fact that the WEP security feature of Wi-Fi networks can be
hacked (broken into electronically). Hackers have successfully retrieved
secret WEP keys used to encrypt data on Wi-Fi networks. With these keys,
the hacker can decrypt the packets of data transmitted over a wireless network.
Since 2003, the Wi-Fi Alliance has been certifying and promoting a
replacement security technology for WEP: Wi-Fi Protected Access (WPA and
the newer but closely related WPA2). WPA/WPA2 is based on an IEEE standard
effort known as 802.11i (so many 802.11s huh?). This technology, which
makes cracking a network’s encryption key much more difficult, is standard
in most Wi-Fi access points and network adapters available now. As discussed
earlier in this chapter, in the section “Certification and Standards Support,”
look for Wi-Fi Alliance certifications for WPA equipment.
Any Wi-Fi gear that you buy should support the latest security certification —
WPA2. Don’t accept any less and don’t forget to turn on your network’s
security.
See Chapter 9 for a full discussion of how to set up basic security for your
wireless home network.
Other useful security features to look for when buying an AP include
Network Address Translation (NAT), which we discuss earlier in this
chapter
Virtual Private Network (VPN) pass-through that allows wireless network
users secure access to corporate networks
Monitoring software that logs and alerts you to computers from the
Internet attempting to access your network
Logging and blocking utilities that enable you to log content transmitted
over the network as well as to block access to given Web sites

No hay comentarios:

 
Locations of visitors to this page
Nuestro blog en
casas madera y blogs
Reprezint Diaspora in recensamantul Bloggerilor Promoveaza-te pe acest blog
by HORAblogs