Re: Protected WLAN

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 5/17/11 2:01 PM, JD wrote:
> On 05/17/11 12:23, Marko Vojinovic wrote:
>> On Tuesday 17 May 2011 19:47:24 JD wrote:
>>> On 05/17/11 11:23, Steve Searle wrote:
>>>> Around 07:16pm on Tuesday, May 17, 2011 (UK time), JD scrawled:
>>>>> Right. Also, it is not necessarily "neighbours" that are adjacent
>>>>> you your house or a few houses down. Someone can park a car
>>>>> not far from your house, and using the type of home-made antenna
>>>>> James mentioned, they can hack your network.
>>>>> I would strongly encourage you to use MAC address whitelist.
>>>> Because someone with the knowhow to make antenna like this and hack your
>>>> wireless password would have no idea how to spoof mac addresses?
>>>>
>>>> Steve
>>> It just reduces the number of would be hackers to those
>>> with the knowhow. And the probability that such
>>> knowledgeable hackers being near your vicinity is much
>>> less than the casual hackers without such knowledge.
>>> In network security, even the simplest measures should
>>> not be dropped just because there are those with the tools
>>> and the knowhow to hack it. It's like saying No need to lock
>>> your car because the door can easily be opened by an
>>> expert carthief.
>> Oh, come on, it took me cca 20 minutes to go from being an absolute noob to
>> being able to crack my own network. It requires reading through one web page
>> and four man pages.
>>
>>>  From man aireplay-ng:
>> -h<smac>
>>          Set source MAC address.
>>
>> Read the output of airodump-ng for a MAC address of an already connected
>> client to find one that is allowed by the access point firewall. How much of an
>> expert one needs to be to use an option switch in a command?
>>
>> Really, people typically have no idea how easy it is to crack a wireless until
>> they actually try it, at least once. After that, one gets to appreciate what
>> is really a security measure, and what is the "please don't open me" sign on
>> the door.
>>
>> MAC spoofing is trivial. Even in Windows there is a field to type a desired MAC
>> somewhere in the network settings...
>>
>> Best, :-)
>> Marko
>>
> Too much bluster here.
> Show us any credible publication
> that claims wpa2-ps/AES has been easily cracked
> or even cracked at all.
>
JD:

As far as I can discover, it has not been.  DES has and 3DES is in 
danger of being broken (however it offers many permutations of the 
two/three key combination.)

James McKenzie

-- 
users mailing list
users@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe or change subscription options:
https://admin.fedoraproject.org/mailman/listinfo/users
Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines

[Index of Archives]     [Older Fedora Users]     [Fedora Announce]     [Fedora Package Announce]     [EPEL Announce]     [EPEL Devel]     [Fedora Magazine]     [Fedora Summer Coding]     [Fedora Laptop]     [Fedora Cloud]     [Fedora Advisory Board]     [Fedora Education]     [Fedora Security]     [Fedora Scitech]     [Fedora Robotics]     [Fedora Infrastructure]     [Fedora Websites]     [Anaconda Devel]     [Fedora Devel Java]     [Fedora Desktop]     [Fedora Fonts]     [Fedora Marketing]     [Fedora Management Tools]     [Fedora Mentors]     [Fedora Package Review]     [Fedora R Devel]     [Fedora PHP Devel]     [Kickstart]     [Fedora Music]     [Fedora Packaging]     [Fedora SELinux]     [Fedora Legal]     [Fedora Kernel]     [Fedora OCaml]     [Coolkey]     [Virtualization Tools]     [ET Management Tools]     [Yum Users]     [Yosemite News]     [Gnome Users]     [KDE Users]     [Fedora Art]     [Fedora Docs]     [Fedora Sparc]     [Libvirt Users]     [Fedora ARM]

  Powered by Linux