Find the answer to your Linux question:
Results 1 to 4 of 4
Recently I caught someone borrowing bandwidth from me. I blame myself, as I was using WEP. (An older laptop belonging to a roommate couldn't do WPA, and when she got ...
Enjoy an ad free experience by logging in. Not a member yet? Register.
  1. #1
    Just Joined!
    Join Date
    Jul 2009
    Location
    Bizarro-Earth
    Posts
    4

    Red face [SOLVED] Wireless security question


    Recently I caught someone borrowing bandwidth from me. I blame myself, as I was using WEP. (An older laptop belonging to a roommate couldn't do WPA, and when she got a new machine with a modern OS I was just lazy about upping security.)

    While tightening up security, I discovered my Linksys WAP54G was able to white-list MAC addresses, so I went ahead and made use of that feature for an added layer of security.

    Question is: Could I safely get away with just the white-list, or aught I stick with the WPA2-Personal layer as well?

  2. #2
    Linux Enthusiast meton_magis's Avatar
    Join Date
    Oct 2006
    Location
    arizona
    Posts
    699
    whitelists are just 1 more layer of security, and are probably the lowest on the list. It is VERY easy to crack that kind of security, since all you would have to do is sniff wireless trafic and capture a mac address. Then, when you're not using it, they can then assign that address to their card, and they have free bandwidth again.

    If they were able to crack wep, then this method is trivial to perform. I've never cracked wep before, but I could crack a mac white-list in under 1 minute.
    New to the internet, technical forums, or the hacker / open source community??
    Read this to learn good posting habits http://www.catb.org/~esr/faqs/smart-questions.html

    RHCE for RHEL version 5
    RHCT for RHEL version 4

  3. #3
    Linux Engineer Segfault's Avatar
    Join Date
    Jun 2008
    Location
    Acadiana
    Posts
    878
    Sniffing MAC addresses is a piece of cake, they are in plaintext. Changing them is even easier, see man ifconfig.
    The six dumbest ways to secure a wireless LAN | George Ou | ZDNet.com

  4. $spacer_open
    $spacer_close
  5. #4
    Just Joined!
    Join Date
    Jul 2009
    Location
    Bizarro-Earth
    Posts
    4
    Oh duh. I should have thought of spoofing all on my own.

    Ah well, it's in the willingness to ask the question that protects us from our own brain-fartage.

    Thank y'all!

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •