SSID off is never a true solution. Yes, you can still see it, just not in the normal way.

1st the signal is there which makes it obvious there is a WAP in the area.

2nd, SSID broadcast is off, but it's clients are still talking to something advertising it's presence in their packets detectable by promiscuous NIC paired with software like AirSnort. Once you know it's SSID, broadcast is not an issue.

Alternatively WEP makes it harder with SSID off I assume, but then all you need do is scan the valid SSID combinations until you get a response from the WAP. Then proceed with eliciting the needed packets from the WAP until you have enough to crack with.

There is also AFAIK an issue with how clients initially negotiate a WEP session putting key pieces of data out in-the-clear.

All of this covered with script-kiddie tools.

Yes. With WPA & SSID on, who cares, AES & TKIP make it near impossible to crack since 1. it's AES, 2. it's rolling the keys periodically. I would still have concerns as a laymen about regularly occurring known data packet types that can be guessed at until you get the key but I doubt AES is exploitable that way.



Winterlight wrote:
At 11:45 AM 5/3/2006, you wrote:
Hours? Not even.

I don't buy that, I haven't seen anything that supports the notion that spoofing a MAC address is perfunctory. WEP, yes but let's take a step back. The best defense is to hide in plain sight. Turn off broadcasting. You can't hack into what you can't see, or don't know is there. I know of no good reason to have public broadcast of a private WAP. Use a password like SSID, turn off broadcasting, and enable MAC addressing and you have won most of the battle. Add WPA encryption, and your done.




No WEP it takes seconds to read the traffic and extract a MAC. WEP takes longer, but the needed packets can be coerced out of your WAP.

Besides, there's more at stake there than access. What about having someone capture the traffic and taking it home to decrypt to extract your personal info & passwords? These days you have war drivers all over doing shady things because WAP's & tools a common.

While sitting waiting for my mom to come out of doctors office, I scanned for an open WAP to check my email and actually found a lawyers office in the same complex with an open WAP, no encryption, no MAC lockdown and shares up with no password that led to client data. If not for fear of being charged for theft of computing services, I would have knocked on their door and offered my services for a fee. This is worse case, but if had at least been WEP w/ MAC lockdown I would not have simply stumbled across the shares. Of course in that environment it should be WPA and the shares locked with 16+ character passwords, or not on the WiFi at all.

Winterlight wrote:
At 01:52 AM 5/3/2006, you wrote:
At 12:15 PM 02/05/2006, joeuser wrote:
7) Wireless network security.

*cough* Lock by MAC address. Don't expect security and why. Wired better for speed and security.

Locking by MAC address is not secure. It is possible to discover and spoof MAC addresses - WPA with a very secure key is probably the only security.
yeah possible, but very, very unlikely. Few people have the skills to do something like that, and I doubt one of them are going to be sitting in range of your WAP, for hours on end attempting to do so.


Reply via email to