Advertisement
If you have a new account but are having problems posting or verifying your account, please email us on hello@boards.ie for help. Thanks :)
Hello all! Please ensure that you are posting a new thread or question in the appropriate forum. The Feedback forum is overwhelmed with questions that are having to be moved elsewhere. If you need help to verify your account contact hello@boards.ie

WiFi Security Tips

  • 13-06-2013 12:33PM
    #1
    Closed Accounts Posts: 2,663 ✭✭✭


    WiFi is all around us, people are getting smarter hackers are developing new kiddie Scripts for the ability to hack into peoples WiFi.

    Fair enough someone is hacking into my WiFi Connection, this can be "Safe" or "Dangerous"

    Safe -> Their Just going to use your Connection to Download Torrents, Play the PS3 / Xbox online.. Basically use up your Monthly Use of GB.

    Dangerous -> You don't know the other person he can be watching anything from porn to kid porn, Downloading software/uploading.. but the most dangerous part of this is if he is in your WiFi it also Means he is in Your "Network" So if he is Smart enough he could get into your File Shared Folders or even Remote Desktop into your Computer if you have it enabled..

    I have Done this in a Test Environment.

    So how do we Really Keep Our WiFi Safe. their are tools out their that can Crack the WiFi or even ping your Public Broadcast IP so many times that it will publicly Broadcast your WiFi Key.
    Access Key alone will fail but with the Following tips that i have pointed out will keep your WiFi safe and out of harms way.

    Step 1, WPA 2 Key ->

    make it as big as possible but still simply enough for you to remember the bigger it is the longer it will take Cracking tools to Crack some people would give up after 2 - 3 hours.


    CON
    Any WiFi Tool out their can crack your Key within Hours, This alone will not keep your WiFi Save or your Network


    Step 3, Enable your Mac Filter ->

    Once a Mac Filter enabled, When Ever someone tries to log into Your wireless access point a join request is sent, it compares the MAC address of that client against the Mac Address That you have Entered. Clients on the list can log on as normal; clients not on the list are denied any access to your WiFi.

    How to Find Your Mac Address.

    Iphone ->
    Go to Settings -> General -> About -> You should now see a Wi-Fi Address E.G. F0:CB:A1:11:11:C1

    Windows ->
    click on Start type in CMD in the Type Box. A Command Terminal Will Open type in config ip /all Hit Enter you will now see your Adapters. you may see more then 2, look for your Wireless Adapter and Your Mac Address is the Physical Address.
    E.G. 84-3A-4B-1-1E

    Mac OSX ->

    Open Terminal type in networksetup -listallhardwareports
    Or
    Open System Preferences -> Network. From here click on the Adapter you are connection with then Click on Advanced Click on Wi-Fi on the Popup Menu, You should now See Wi-Fi Address aa:aa:aa:aa:aa:aa


    Con

    This Option is not 100% Safe but it will throw off 99.9% of people, Just Like a House Alarm you just pushing that Thief onto the Next House. But their is that 0.1% that love a Challenge, to Break this kind of Security they need to Scan Your Network find out what your Mac Address on your Computer is, Change their Mac Address To Your Mac Address and then Crack your WiFi Code, This is not Worth Doing and a lot of people don't even try..




    Step 4, Disable Your SSID ->

    What is this SSID ? Well its your Service Set Identifier, when you See "Eircom 1111" or "UPC 321" this is the term of SSID. by disabling the SSID Hackers or Crackers will no longer be able to use Cracking tools on your WiFi, how is this ? you have disabled SSID their is no longer a transmit over the Air that Says "HEY EIRCOM111 IS HERE !!!" it is Hidden. This Means you will no longer be able to See this Either. Which Means you will have to Set up the Connection Your Self.

    Iphone ->

    Go to Settings click on WiFi. You Will See a Choose a Network click on other you will then be asked to enter the Name of your Network. Type in the Full Name of your Network, Click on Security you will see different options WEP,WPA,WPA2 etc. click on the one that you have Set in your WiFi Settings then click on Other Network on the Top Left hand Side You are now asked to Enter in our Password.

    Windows -> inside Network & Sharing Center click on Set up a New Connection or Network a Wizard will Start up, Click on Manually connect to a Wireless Network,
    In the Next Section just fill in the details. Windows will now automatically connect to the WiFi you have just Hidden..

    Con
    Hard to Set up. can be troublesome a lot of the times. Still again not 100% safe, but again only 0.1% not even would go to the hassle of this.
    How is this Done?
    the person would need to know for sure their is a hidden SSID out their some where. he uses a Scanner to listen for clients to connect to the network or try and force the client to disconnect with some tools and when the client reconnects. The Scanning tool will just catch onto that SSID.


Comments

  • Closed Accounts Posts: 18,966 ✭✭✭✭syklops


    their are tools out their that can Crack the WiFi or even ping your Public Broadcast IP so many times that it will publicly Broadcast your WiFi Key.

    What?

    Any WiFi Tool out their can crack your Key within Hours, This alone will not keep your WiFi Save or your Network

    WPA2 with a loooong non-dictionary key can not be cracked in hours.

    Tip 1: Use a WPA2 key with a loooon non-dictionary key.
    Step 3, Enable your Mac Filter ->

    Once a Mac Filter enabled, When Ever someone tries to log into Your wireless access point a join request is sent, it compares the MAC address of that client against the Mac Address That you have Entered. Clients on the list can log on as normal; clients not on the list are denied any access to your WiFi.

    Waste of time, MAC spoofing takes seconds.


  • Registered Users, Registered Users 2 Posts: 37,485 ✭✭✭✭Khannie


    syklops wrote: »
    Waste of time, MAC spoofing takes seconds.

    You'd need to know the MAC to spoof though.


  • Closed Accounts Posts: 2,663 ✭✭✭Cork24


    Theirs a Tool on Linux BlackTrack which allows you to flood, a Router which in turn would force it to reboot while its rebooting your Scanner would pick up all kind of Data information being sent out into the air waves and within that information you would have the Access Key...

    Look up the CEH Course, you can get the Course content information on the Net and the Course lab Manuals. its where i Saw that way of Hacking WiFi being Done.

    WPA2 with a loooong non-dictionary key can not be cracked in hours.

    but it can still be cracked....


    Mac- Spoofing how many people know how to do it ? people aren't going to go out of their way to spoof just to go onto Facebook...

    All the stuff i wrote can be cracked / hacked. i didn't say their were 100% safe.. its trying to make life harder for the hacker or cracker which is what it comes down to.

    As i said in my post
    Con
    This Option is not 100% Safe but it will throw off 99.9% of people, Just Like a House Alarm you just pushing that Thief onto the Next House. But their is that 0.1% that love a Challenge, to Break this kind of Security they need to Scan Your Network find out what your Mac Address on your Computer is, Change their Mac Address To Your Mac Address and then Crack your WiFi Code, This is not Worth Doing and a lot of people don't even try..


  • Closed Accounts Posts: 18,966 ✭✭✭✭syklops



    Mac- Spoofing how many people know how to do it ? people aren't going to go out of their way to spoof just to go onto Facebook...

    All the stuff i wrote can be cracked / hacked. i didn't say their were 100% safe.. its trying to make life harder for the hacker or cracker which is what it comes down to.

    You answered your own question there.
    Theirs a Tool on Linux BlackTrack which allows you to flood, a Router which in turn would force it to reboot while its rebooting your Scanner would pick up all kind of Data information being sent out into the air waves and within that information you would have the Access Key...

    Look up the CEH Course, you can get the Course content information on the Net and the Course lab Manuals. its where i Saw that way of Hacking WiFi being Done.

    That wasnt on it when I did the CEH. I'll check it out, thanks.
    WPA2 with a loooong non-dictionary key can not be cracked in hours.

    but it can still be cracked....

    If the passphrase is not in the dictionary, then you are talking a brute force attack which could take days if not weeks.


  • Registered Users, Registered Users 2 Posts: 1,375 ✭✭✭DoesNotCompute


    Khannie wrote: »
    You'd need to know the MAC to spoof though.

    Even with wifi encryption enabled, permitted MAC addresses are still broadcast in the clear, only the payload is encrypted. The MAC address can be sniffed using a packet sniffer.


  • Advertisement
  • Closed Accounts Posts: 18,966 ✭✭✭✭syklops


    Khannie wrote: »
    You'd need to know the MAC to spoof though.

    As long as the client is sending traffic you can get it from a packet sniffer. Simples.


  • Registered Users, Registered Users 2 Posts: 37,485 ✭✭✭✭Khannie


    Even with wifi encryption enabled, permitted MAC addresses are still broadcast in the clear, only the payload is encrypted. The MAC address can be sniffed using a packet sniffer.

    Jesus. That seems a bit short sighted.


  • Registered Users, Registered Users 2 Posts: 8,814 ✭✭✭BaconZombie


    The network need to know where the packet is coming from and where it is going to.
    Khannie wrote: »
    Jesus. That seems a bit short sighted.


  • Registered Users, Registered Users 2 Posts: 1,299 ✭✭✭moc moc a moc


    "Kiddie scripts"! That gave me my LOL of the day.
    Cork24 wrote: »
    Theirs a Tool on Linux BlackTrack which allows you to flood, a Router which in turn would force it to reboot while its rebooting your Scanner would pick up all kind of Data information being sent out into the air waves and within that information you would have the Access Key...

    If this were true, it would be all over the security community. Details, please.
    Cork24 wrote: »
    WPA2 with a loooong non-dictionary key can not be cracked in hours.

    but it can still be cracked....

    In about two hundred years. Do you think your home network data will still be valuable in two hundred years?
    Cork24 wrote: »
    Mac- Spoofing how many people know how to do it ? people aren't going to go out of their way to spoof just to go onto Facebook...

    You think someone who knows how to crack WPA2 won't know how to spoof a MAC address??


    Mate, you sound like you're parroting something you read somewhere without fully understanding what you're talking about. Being security-conscious is sensible - scaremongering isn't.


  • Closed Accounts Posts: 18,966 ✭✭✭✭syklops


    Cork24 wrote: »
    Theirs a Tool on Linux BlackTrack which allows you to flood, a Router which in turn would force it to reboot while its rebooting your Scanner would pick up all kind of Data information being sent out into the air waves and within that information you would have the Access Key...

    Still trying to track down this tool. You said Blacktrack, Im assuming you meant backtrack? I read the study guide and watched a video on wireless hacking froma CEH CBT and there was no mention of this, just cracking WEP(snore), and running dictionary attacks against WPA. Incidentally, in that video it pointed out that SSID-cloaking and MAC filtering are basically a waste of time.


  • Advertisement
  • Registered Users, Registered Users 2 Posts: 7,157 ✭✭✭srsly78


    He's talking about the reauth attack, this makes associated client drop and reauth. The attacker can then grab the encrypted key and start running password crack, which will take ages for a proper password.

    It just speeds up the process of grabbing the key (to crack it), otherwise you would have to wait until a new client connects. The key does not get broadcast in plain text -.-

    Nothing new to see. The OP also fails to point out that network traffic will still be encryped by ssl etc (in before ssl is useless...).


  • Closed Accounts Posts: 18,966 ✭✭✭✭syklops


    srsly78 wrote: »

    Nothing new to see. The OP also fails to point out that network traffic should still be encryped by ssl etc (in before ssl is useless...).

    FYP ;)


  • Registered Users, Registered Users 2 Posts: 37,485 ✭✭✭✭Khannie


    The network need to know where the packet is coming from and where it is going to.

    Ah yeah, I understand that. I just thought it was all encrypted. I haven't looked closely at the protocol before. Kinda makes a mockery of MAC filtering functionality. On Linux at least it just couldn't be easier to fake your MAC.

    When we were on holidays last year, I copped that the "free introductory wifi" was based on the device MAC address. 5 minutes later I had a script knocked up. More introductory wifi? Why thank you!


  • Closed Accounts Posts: 18,966 ✭✭✭✭syklops


    Khannie wrote: »

    When we were on holidays last year, I copped that the "free introductory wifi" was based on the device MAC address. 5 minutes later I had a script knocked up. More introductory wifi? Why thank you!

    Same for me in Prague AIrport in November.


  • Registered Users, Registered Users 2 Posts: 3,131 ✭✭✭Dermot Illogical


    Steps 3 & 4 are useless and will be bypassed in seconds. A network scan will show the network minus it's SSID (but will show the network) which lets the attacker know there's a target to be had. If a client is connected he can see the MAC and use it to inject a packet to disassociate the client. When the client reconnects (instantly) he will have both the SSID and 4 way handshake to run the password attack against.
    Long password is your answer. Or don't have any clients connected, but that defeats the purpose of having a network.
    Cork24 wrote: »

    Step 3, Enable your Mac Filter ->
    Step 4, Disable Your SSID ->


  • Moderators, Recreation & Hobbies Moderators, Science, Health & Environment Moderators, Technology & Internet Moderators Posts: 94,820 Mod ✭✭✭✭Capt'n Midnight


    Don't change any of your WiFi passwords over a wireless connection.

    Security is about layers.

    Using 5GHz or channels 12,13 on 2.4Gz mainly gives benefits in congestion, but might just hamper some sniffers.



    Waste of time, MAC spoofing is easy

    ifconfig eth0 down hw ether 00:00:00:00:00:01
    ifconfig eth0 up

    For windows
    Information on all your NICs can be found the registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\ Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\ . Under this key you will find a bunch of sub keys labeled as 0000, 00001, 0002 and so forth. We can assume any MAC address we want by finding the key that controls the NIC we want to change, putting in a string value called "NetworkAddress" and setting it to the MAC address we want to use formatted as a twelve digit hex number (example: 000000000001).
    Change key, export NetworkAddress to yet another clickable .reg file rinse and repeat


    Make sure you have updated firmware if you have an access point with WPS :(


  • Closed Accounts Posts: 18,966 ✭✭✭✭syklops


    Make sure you have updated firmware if you have an access point with WPS :(

    And then disable WPS.

    Reaver ;)


Advertisement