1. You are viewing our forum as a guest. For full access please Register. WindowsBBS.com is completely free, paid for by advertisers and donations.

Wireless security concerns...

Discussion in 'Networking (Hardware & Software)' started by ollyk, 2008/06/23.

  1. 2008/06/23
    ollyk

    ollyk Inactive Thread Starter

    Joined:
    2007/08/01
    Messages:
    49
    Likes Received:
    0
    Hi folks, I am fairly new to the world of wireless networking and am trying to learn all the basics, but recently experienced something that has forced me to stop using wireless full stop!

    Basically I was browsing the net one evening and got a warning from Air Defence about a potential security threat. Unfortunately I can't remember exactly what the warning said, and didn't get a screen shot as almost immediately I got a second dialougue box from XP as below...

    [​IMG]

    At this point I opened Net Stumbler to see if there were any other access points in my area and found this....

    [​IMG]

    Now upon looking up what that little astrix meant I immediately shut down on both AP & laptop. I performed another scan a few minutes later and this o2 user had dissapeared.

    OK folks so can you tell me what is going on please and what the hell do I do next? Has someone been trying to hack into my laptop? or is this somthing as simple as a wireless channel conflict? According to the cross on net stumbler my laptop has connected with this geezer or have I got this wrong?

    I think I have taken most precautions as I don't broadcast my SSID, I have specified certain MAC addresses on my AP, implemented WPA2 personal and on my laptop have Airdefence, zonealarm and net stumbler as my aids / defence.

    I am aware non of the above are a real defence to someone determined enough but I have decided againt having a 24 hr access point and am currently connecting my laptop the old fashioned way 99% of the time...

    Any help appreciated...

    Olly.
     
  2. 2008/06/23
    TonyT

    TonyT SuperGeek Staff

    Joined:
    2002/01/18
    Messages:
    9,072
    Likes Received:
    400
    The Air Defense warning is negligible. It probably just detected a Probe Request from a Windows computer. Windows computers will send out probe requests periodically. Yours does too! A scan is done probing for wlans in range.

    To secure your wlan use WPA2 encryption. This will prevent 99.99% of people from being able to access your wlan. The .01% = skilled Linux users who know how to crack WPA wlans. (actually much less that .01%)

    Disabling SSID broadcast is a useless security measure. There are software for Windows, Mac and Linux that can scan and detect wlans even if broadcast is disabled.

    WEP encryption is also useless and insecure. When running Linux, I can get onto a WEP encrypted wlan is less than 10 minutes, average is kess than 3 minutes. http://www.aircrack-ng.org/doku.php

    (note: I only do this when testing my customers' security, I do not use encrypted wlans that I'm not authorized to use, that's illegal)

    Just so you know, it is 100% legal per FCC in US to intercept unencrypted radio wave transmissions, illegal to intercept encrypted transmissions unless authorized by the owner of the broadcasting device.

    Your wlan is pretty secure if use WPA2 TKIP and mac address filtering. That means that the only allowed connectionss must have the WPA2 key and the specified mac address. Mac address filtering won't stop Linux hackers because the mac address of the adapter can be changed in Linux, but WPA2 is tough to crack. It takes hours or even weeks or year(s) to crack a WPA2 pass phrase UNLESS the pass phrase is a word in a dictionary or a common pass phrase such as "person's name ", "pet's name ", or "password" etc.

    1. Use a pass phrase that is NOT in any dictionary, contains cap letters, lower case letters, at least one number as well as a special character ~!@#$%^&*() and make it at least 8-10 characters long.

    2. Use the same type of password for your router-access point login. These devices have known default logins:
    http://members.cox.net/tonyt/default_pws.html

    Do 1 & 2 and no one will ever get unathorized access to your wlan, unless they are skilled, using Linux and willing to spend 6 months straight 24hrs/day trying to break in!
     
    Last edited: 2008/06/23

  3. to hide this advert.

  4. 2008/06/23
    ollyk

    ollyk Inactive Thread Starter

    Joined:
    2007/08/01
    Messages:
    49
    Likes Received:
    0
    Oh ok Thanks Tony, can I ask why Net stumbler has put a cross by the o2 AP? Maybe I have miss-read / understood the nature of this symbol?
    *Also what should I do when the the XP Configeration box I posted above shows up? What does this actually mean?*
    Maybe I am missing something but when I read about WLAN security it is only ever talking about AP security but not the devices that are communicating with the AP i.e. my laptop. So am I right in thinking in order for someone to remotely hack into my laptop they would have to assume the identity of my AP first?

    Sorry for all the questions I just don't get this ATM I think a crash course in basic networking would be a great help right now!

    * ok I think I have worked out this is a conflict between net stumbler & windows own wireless manager so ignore that!
     
    Last edited: 2008/06/23
  5. 2008/06/23
    TonyT

    TonyT SuperGeek Staff

    Joined:
    2002/01/18
    Messages:
    9,072
    Likes Received:
    400
    When stumbler runs it shuts down the windows wireless zero config service (windows wifi mgmt software).

    What cross? You mean 1+? That's channel 1 and a plus sign as distinguised from channel 11 (eleven).

    Your laptop can only be accesses by someone remotely if he first gets to your router-ap control panel via the Web browser, and there he could discover the name of your workgroup and your comp, and if you have file sharing enabled he could connect to your shares.

    The other way would be for the person to be running linux and sniff out the name of your wlan. This can be done even if ssid broadcast is disabled. Once he has your ssid he can setup his laptop as a "fake access point" and use your ssid. He can then kill your connection to your access point and trick Windows into connecting to his laptop. But this is not going to happen in all probability. He'd need a real good reason to target you to begin with.

    Those ssids you see in stumbler are not computers, they are other access points. You can see the same thing when Windows scans for available networks.
     

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.