|
||
Protecting your wireless network from hackingMany users search for a wireless network to get on line-at the mall, at school or at home. It is often that they do not have permission to use the network. These wireless parasites can break into a network when they connect. They can open up the network with all the computers on it to countless security problems. Home networks usually include passwords to protect the wireless network from unauthorized access. But a new study by the A. James Clark School of Engineering's Michel Cukier indicates passwords alone may not provide enough protection for home wireless networks. "Unsecured connections are an open invitation to hackers seeking access to vulnerable computers."
If a wireless router only accepts connections from known MAC addresses (a serial number for each network adaptor), a hacker will need to learn the address of a legitimate computer on the network to access the network. The encryption key must be changed often. If you have trouble remembering passwords, checkout Password Corral. A seasoned administrator will choose a passphrase that is intentionally long, contains numbers, letters, and special characters to make it extremely difficult for someone to guess. Change your wireless network's ID. Your network name is also known as a Service Set Identifier (SSID). By default, it might be set to something like "linksys" if you use a Linksys access router. Use SSID cloaking. When you cloak your SSID, you keep certain default wireless messages from broadcasting the ID to everyone. Many wireless access points will have some way for you to get logs of attempted connections. If you suspect a hacker, this is excellent way to know who it is. If nothing shows up in the log, you know all is secure. An attacker can manufacture new packets on the fly and persuade wireless stations to accept him as legitimate. Most computer users are not hackers. The may also get into a network with a wireless card in the computer or wifi chip. When a user finds a wireless network, then trying to connect is the next step. A user can easily connect to the SSID. Some hackers find the non-broadcast SSID with software named Kismet. If the wireless network is using authentication and/or encryption, could purchase a tool or software to break the code. Airsnort - This is a very easy to use tool that can be used to sniff and crack WEP keys. Many people insult use of WEP, but for protection it is better than using nothing. You will discover using this tool takes a lot of sniffed packets to get into the WEP key. Protecting your wireless network against these tools It is important to know how to use these tools. Also, it is important to know best practices on how to secure your wireless network against these tools. NetStumbler - Do not broadcast your SSID.Ensure your WLAN is protected by using advanced authentication and encryption. |
||
Copyright 2003-2020 by BusinessKnowledgeSource.com - All Rights Reserved
Privacy Policy, Terms of Use |