> You should be aware that MAC addresses can be forged as well. I believe this also works (at least in Linux)
ifconfig wlan0 hw ether [new mac] Tools like kismet make it all too easy to find a valid MAC address to spoof on the network. Application-Layer encryption is definitely the most secure method. EAP+Dynamic WEP keys is a significant enhancement, but still vulnerable to session hijacking. You may also consider using Token-based authentication if you are going to run EAP (and to authenticate your shells too). RSA SecurID's ACE/Server will emulate a RADIUS server, making it very useful for these types of authentication. I'm sure Cryptocard has something useful too. What would be schweet is if you could use the SecurID token code (which changes every 30 or 60 seconds) as a one-time pad for dynamic WEP key changes. Then you wouldn't have to pass WEP keys across the network where they could be intercepted...and changing every 60 seconds would make it virtually un-bruteable. If you haven't read "Wireless Hacks" by O'Reilly yet, I strongly recommend you grab a copy; it's an excellent little book. http://www.amazon.com/exec/obidos/tg/detail/-/0596005598/qid=1070037607/sr=1-1/ref=sr_1_1/002-0400399-7348019?v=glance&s=books Jonathan _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
