Wireless security breech
Results 1 to 7 of 7

Thread: Wireless security breech

  1. #1
    Senior Member Spekter1080's Avatar
    Join Date
    Oct 2005
    Location
    Iowa
    Posts
    101

    Wireless security breech

    I've tried to research on google, but I haven't found much on wireless penetration testing. I'm not really looking for a tutorial on how to do it, more of just the theory behind it. I don't understand really how a laptop can connect to a secured network without the network key. Would the cracker sniff packets for the key or try by other means (breaking in from the internet and setting up a zombie for use as a backdoor for example)? Knowing this could help me secure a wireless network if asked to. Any help would be appreciated. Thanks.
    there's always a way in...

  2. #2
    Member
    Join Date
    Sep 2006
    Location
    At a keyboard
    Posts
    82
    Usually a break in would occur by an attacker sniffing traffic or, and in some cases, injecting traffic on the wireless network. This topic has been done to death in ao.

    http://www.antionline.com/forumdispl...s=&forumid=684
    "I have died, I will die, It's alright, I don't mind"

  3. #3
    Senior Member Spekter1080's Avatar
    Join Date
    Oct 2005
    Location
    Iowa
    Posts
    101
    I thought as much, so I searched for it. Maybe I didn't put in the right keywords. Thanks for the thread referral.
    there's always a way in...

  4. #4
    Member
    Join Date
    Sep 2006
    Location
    At a keyboard
    Posts
    82
    One thing to keep in mind is how the network is secured. Theres several ways of attempting to secure a wireless network some are good, some are worthless. The real problem comes in with the fact the point of access extends the reach of the radio signal the router is putting out. You can take precautions and measures to make your network less of a target, but if its a "security priority" enviorment, the wireless will not do. WPA2 is about as new as your going to get on encrypting the wireless connections if your hardware supports it.

    Normally though just having some measures in place will deflect most wardrivers that will go somewhere else seeking an open signal. This won't do much if someone has decided to target your network specifically. I fireup kismet or airodump from time to time just to see whats going on in the airwaves. Usually only if I notice some one suspicous parked near my house though. :P
    "I have died, I will die, It's alright, I don't mind"

  5. #5
    Member TheX1le's Avatar
    Join Date
    Sep 2006
    Posts
    73

    Re: Wireless security breech

    I don't understand really how a laptop can connect to a secured network without the network key.

    end quote

    They are connected on layer two via mac addy but not layer 3 which is IP
    ...."Cant stop the signal Mel, Every thing goes some where and i go every where."...... "From here to the eyes and the ears of the verse, thats my motto or might be if i start having a motto" - Mr. Universe "Serenity"

  6. #6
    Senior Member linuxcomando's Avatar
    Join Date
    Sep 2001
    Posts
    430
    I toor\'d YOU!

  7. #7
    Right turn Clyde Nokia's Avatar
    Join Date
    Aug 2003
    Location
    Button Moon
    Posts
    1,696

    Red face

    Some people appear to like this tutorial about getting around the minor irritation of WEP:
    http://www.tazforum.**********.com/viewtopic.php?t=2069
    Drugs have taught an entire generation of kids the metric system.

    http://tazforum.**********.com/

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •