Hot Downloads

Welcome, Guest
Username: Password: Remember me

TOPIC: Linksys WRT54GL lan hackproof?

Linksys WRT54GL lan hackproof? 10 years 2 months ago #17201

  • dtbsz
  • dtbsz's Avatar
  • Offline
  • New Member
  • Posts: 2
  • Karma: 0
Is a lan with WPA + SSID broadast off + MAC control hackproof? If not, in theory, how would it be possible?
::[ dtbsz ]::
The administrator has disabled public write access.

Re: Linksys WRT54GL lan hackproof? 10 years 2 months ago #17204

  • Smurf
  • Smurf's Avatar
  • Offline
  • Moderator
  • Posts: 1390
  • Karma: 1
SSID broadast off
- Although this can be done, most of the Wireless sniffers can actually still read this information so although its good to stop general people seeing it, if someone wanted to they could.
MAC control
- Again, this can still be got around by spoofing the MAC address on the machine they want to gain access with. It may take some time to get the right MAC though as the number of possibilities are quite large.
WPA
- Much stronger then WEP however i beleive it is now crackable. WPA2 is much more stronger and would take a lot longer to crack.

All the above will help to secure your wireless, it all depends on how secure you want it.

I could be wrong here as its been a while since i read up on how to secure wireless but a few suggestions was to use Radius and EAP to authenticate the clients with the access points. Also setting up VPN's to secure the communications over the Wireless network (thats physically seperated from the rest of the network). This will then be able to use IPSec for securing the traffic.

Hope it helps
Wayne Murphy
Firewall.cx Team Member
www.firewall.cx

Now working for a Security Company called Sec-1 Ltd in the UK, for any
Penetration Testing work visit www.sec-1.com or PM me for details.
The administrator has disabled public write access.

Re: Linksys WRT54GL lan hackproof? 10 years 1 month ago #17545

  • Gosbollen
  • Gosbollen's Avatar
  • Offline
  • New Member
  • Posts: 12
  • Karma: 0
If you use a long password that doens't contain actual words, you will be safe enough.

To crack WPA, you have to capture the authentication process (easily done) and then run a dictionary brute force attack against it (easy/hard depends on password complexity).


A password like this would take more than a while to crack :)

"A_'JDH#"341/("SHsLHS"0+4Js"
The administrator has disabled public write access.
Time to create page: 0.076 seconds

CCENT/CCNA

Cisco Routers

  • SSL WebVPN
  • Securing Routers
  • Policy Based Routing
  • Router on-a-Stick

VPN Security

  • Understand DMVPN
  • GRE/IPSec Configuration
  • Site-to-Site IPSec VPN
  • IPSec Modes

Cisco Help

  • VPN Client Windows 8
  • VPN Client Windows 7
  • CCP Display Problem
  • Cisco Support App.

Windows 2012

  • New Features
  • Licensing
  • Hyper-V / VDI
  • Install Hyper-V

Linux

  • File Permissions
  • Webmin
  • Groups - Users
  • Samba Setup