technology articles business management businesses Marketing sales Technology Business finance Lean Manufacturing small business Investing articles employee health

Protecting your wireless network from hacking

Many users search for a wireless network to get on line-at the mall, at school or at home. It is often that they do not have permission to use the network. These wireless parasites can break into a network when they connect. They can open up the network with all the computers on it to countless security problems.

Home networks usually include passwords to protect the wireless network from unauthorized access. But a new study by the A. James Clark School of Engineering's Michel Cukier indicates passwords alone may not provide enough protection for home wireless networks. "Unsecured connections are an open invitation to hackers seeking access to vulnerable computers."


Michel Cukier recommends that networks take some additional steps:
"Limit the strength of your wireless network so it cannot be detected outside the bounds of your home. Turn off SSID broadcasting. Choose Wi-Fi Protected Access (WPA) instead of WEP which can be hacked into using special software. If your wireless access point only supports Wired Equivalent Privacy (WEP) for protection, you should buy a new access point or upgrade the firmware.

If a wireless router only accepts connections from known MAC addresses (a serial number for each network adaptor), a hacker will need to learn the address of a legitimate computer on the network to access the network.

The encryption key must be changed often. If you have trouble remembering passwords, checkout Password Corral. A seasoned administrator will choose a passphrase that is intentionally long, contains numbers, letters, and special characters to make it extremely difficult for someone to guess.

Change your wireless network's ID. Your network name is also known as a Service Set Identifier (SSID). By default, it might be set to something like "linksys" if you use a Linksys access router. Use SSID cloaking. When you cloak your SSID, you keep certain default wireless messages from broadcasting the ID to everyone.

Many wireless access points will have some way for you to get logs of attempted connections. If you suspect a hacker, this is excellent way to know who it is. If nothing shows up in the log, you know all is secure.

An attacker can manufacture new packets on the fly and persuade wireless stations to accept him as legitimate.
A hacker is
A person who explores the details of systems. A hacker accesses computers from an unauthorized entry as opposed to most users.
Someone who programs computers maybe obsessively or who enjoys programming.
A person who is good at programming quickly.
An expert at a particular program, or one who works using it or on it.
One who enjoys the challenge of getting around the limits set by computer owners or corporations or websites.
A hacker can also be snoopy computer guru who tries to discover personal information like identity and credit card information by breaking into the computer files. Some terms are `password hacker' or `network hacker'.

Most computer users are not hackers. The may also get into a network with a wireless card in the computer or wifi chip. When a user finds a wireless network, then trying to connect is the next step. A user can easily connect to the SSID.

Some hackers find the non-broadcast SSID with software named Kismet. If the wireless network is using authentication and/or encryption, could purchase a tool or software to break the code.

Airsnort - This is a very easy to use tool that can be used to sniff and crack WEP keys. Many people insult use of WEP, but for protection it is better than using nothing. You will discover using this tool takes a lot of sniffed packets to get into the WEP key.
CowPatty - Is used as a tough tool for cracking WPA-PSK, tat web gurus consider the "New WEP" for home wireless security. This program tries many different options from a dictionary file to see if one matches the Pre-Shared Key.
ASLeap - If a network is using LEAP, this tool can be used to gather the authenticating data hat is being transmitted across the network, and these ID files can be cracked wide open.LEAP doesn't protect the authentication like other "real" EAP types, which is the main reason why LEAP can be broken.
Wireshark (formerly Ethereal) - There is no question that it is an extremely valuable tool. Ethereal can scan wireless and Ethernet data and comes with some robust filtering capabilities. It can also be used to discover 802.11 management information streams. It also can be used as a tool to hack into non-broadcast SSIDs.

Protecting your wireless network against these tools

It is important to know how to use these tools. Also, it is important to know best practices on how to secure your wireless network against these tools.

NetStumbler - Do not broadcast your SSID.Ensure your WLAN is protected by using advanced authentication and encryption.
Kismet - There is nothing you can do to stop Kismet from finding your WLAN, so make sure your WLAN is protected by using advanced authentication and encryption.
Airsnort - Uses a 128-bit, not a 40-bit WEP encryption key.This takes longer to crack.If your computer supports it, use WPA or WPA2 instead of WEP (may require a firmware or software update).
Cowpatty - Uses long and complex WPA Pre-Shared Key.This type of key would have less of a chance of being found in a dictionary file that could be used to guess your key and/or would take longer.
ASLeap - Use long and complex credentials, or switch to EAP-FAST or a different EAP type.


FREE: Get More Leads!
How To Get More LeadsSubscribe to our free newsletter and get our "How To Get More Leads" course free via email. Just enter your first name and email address below to subscribe.
First Name *
Email *


Get More Business Info
Sponsored Links
Recent Articles

Categories

Copyright 2003-2020 by BusinessKnowledgeSource.com - All Rights Reserved
Privacy Policy, Terms of Use