Page 3 of 3 FirstFirst 123
Results 33 to 41 of 41

Thread: any point in 256bit wep encrypted wireless

  1. #33
    Banned StormPC's Avatar
    Join Date
    Sep 2004
    Posts
    1,194
    Thanks
    0
    Thanked
    0 times in 0 posts
    Quote Originally Posted by aidanjt
    In theory its as easy as that, not in reality.. Like I said, changing your MAC address isn't the same as reinstalling windows. All that is done at the hardware level.
    You don't understand the first thing about networking or computers if you believe that. What is your point with all of this? That WPA is too difficult to use or that it is unnecessary? I don't get it.

    I don't think anybody is talking about changing the actual MAC address, I think they mean there are ways to cloak the actual address and make other devices believe your MAC is something other than what it actually is.

    I'll tell you right now, no matter how good you think your security is, when it comes to securing a network, anything that is done can be undone! Security is relative only. There is no such thing as absolute security.

    The time it takes to breach a WEP encrypted broadcast depends on how fast and how active the network is. If packets are sent at full 54Mbps speeds and there is at least 2 minutes of activity at this rate even I could figure out the key. Actually, the software I have does it automatically. Takes less than 2 minutes most of the time. WPA is a whole other story, but even WPA has vulnerabilities.

    Like I said, if it can be done it can be undone.

    The point myself and others are trying to make is that WPA gives you some security along with your privacy, where WEP gives only very limited privacy. You might say WEP is like closing the door and WPA is like locking and deadbolting it. You can still get in but a closed door is easier to open than a well-locked one.
    Last edited by StormPC; 30-09-2005 at 09:46 PM.

  2. #34
    Ex-MSFT Paul Adams's Avatar
    Join Date
    Jul 2003
    Location
    %systemroot%
    Posts
    1,926
    Thanks
    29
    Thanked
    77 times in 59 posts
    • Paul Adams's system
      • Motherboard:
      • Asus Maximus VIII
      • CPU:
      • Intel Core i7-6700K
      • Memory:
      • 16GB
      • Storage:
      • 2x250GB SSD / 500GB SSD / 2TB HDD
      • Graphics card(s):
      • nVidia GeForce GTX1080
      • Operating System:
      • Windows 10 x64 Pro
      • Monitor(s):
      • Philips 40" 4K
      • Internet:
      • 500Mbps fiber
    Quote Originally Posted by aidanjt
    yea, I built one nForce-based system which required you to manually enter the MAC in the bios of its ethernet interface, a testiment to the quality of nVidia engineering.. its not common however, especially for WLAN.
    This is also untrue, it is perfectly possible and permitted for an application to change the MAC address of an outgoing packet, I can give you 2 such examples:
    - clustering technology requiring a virtual MAC address to receive inbound connections (can be a unicast or multicast MAC)
    - virtual machines (can have many, many guest OS's that can use the NIc on the host and the packets on the wire will use whatever the MAC address is specified in the virtual machine)

    Many manufacturers have the property "network address" in the properties of the NIC where you can override the predefined value.
    ~ I have CDO. It's like OCD except the letters are in alphabetical order, as they should be. ~
    PC: Win10 x64 | Asus Maximus VIII | Core i7-6700K | 16GB DDR3 | 2x250GB SSD | 500GB SSD | 2TB SATA-300 | GeForce GTX1080
    Camera: Canon 60D | Sigma 10-20/4.0-5.6 | Canon 100/2.8 | Tamron 18-270/3.5-6.3

  3. #35
    Gentoo Ricer
    Join Date
    Jan 2005
    Location
    Galway
    Posts
    11,048
    Thanks
    1,016
    Thanked
    944 times in 704 posts
    • aidanjt's system
      • Motherboard:
      • Asus Strix Z370-G
      • CPU:
      • Intel i7-8700K
      • Memory:
      • 2x8GB Corsiar LPX 3000C15
      • Storage:
      • 500GB Samsung 960 EVO
      • Graphics card(s):
      • EVGA GTX 970 SC ACX 2.0
      • PSU:
      • EVGA G3 750W
      • Case:
      • Fractal Design Define C Mini
      • Operating System:
      • Windows 10 Pro
      • Monitor(s):
      • Asus MG279Q
      • Internet:
      • 240mbps Virgin Cable
    Quote Originally Posted by StormPC
    You don't understand the first thing about networking or computers if you believe that. What is your point with all of this? That WPA is too difficult to use or that it is unnecessary? I don't get it.
    ...
    No, I didn't say anything against WPA at all, I'm saying the average home network doesn't need super-duper 1024-bit key serverside wireless encryption. What I've said is if your network is *THAT* important don't use wireless. What I've said is people are talking about using 12 inches of steel when any prospective attacker is likely to only have a scaple at best. In fact, the guy next door to you is more likely to have a cache of firearms and explosives than the knowledge of cryptology or networking. Yes, there are ways to spoof MAC addresses, but how many people know how to do it?.. how many people know how to aquire WEP secured networks, or WPA is even less so.. how many people know SSL work arounds?.. not common to put it lightly. Bottom line is, either you want security (wires) or you want to walk around your house with your laptop and have a potential security risk.
    Quote Originally Posted by Agent View Post
    ...every time Creative bring out a new card range their advertising makes it sound like they have discovered a way to insert a thousand Chuck Norris super dwarfs in your ears...

  4. #36
    Banned StormPC's Avatar
    Join Date
    Sep 2004
    Posts
    1,194
    Thanks
    0
    Thanked
    0 times in 0 posts
    I do not have the luxury. I need wireless, as do many others. There is no excuse for not using WPA. It's easier than WEP and works much better.

  5. #37
    Ex-MSFT Paul Adams's Avatar
    Join Date
    Jul 2003
    Location
    %systemroot%
    Posts
    1,926
    Thanks
    29
    Thanked
    77 times in 59 posts
    • Paul Adams's system
      • Motherboard:
      • Asus Maximus VIII
      • CPU:
      • Intel Core i7-6700K
      • Memory:
      • 16GB
      • Storage:
      • 2x250GB SSD / 500GB SSD / 2TB HDD
      • Graphics card(s):
      • nVidia GeForce GTX1080
      • Operating System:
      • Windows 10 x64 Pro
      • Monitor(s):
      • Philips 40" 4K
      • Internet:
      • 500Mbps fiber
    Quote Originally Posted by aidanjt
    No, I didn't say anything against WPA at all, I'm saying the average home network doesn't need super-duper 1024-bit key serverside wireless encryption.
    When it comes to security, for example firewalls, customers will ask "are we 100% secure?" and the best reply is "you are secure as you can be today" - any claim beyond this would be a lie, otherwise you would never see hotfixes, service releases or whatever even from companies with respected, dedicated, carrier-class solutions.

    If we applied your method of thinking then we would "make do" with a lesser form of security when a much better one which is free and identical to configure is available.
    Browsers would still use 40-bit encrpyption because, hey, what's the chance that someone smart enough with the right tools is able to capture the traffic, right?

    You seem convinced that we are spreading FUD, but if Mr Moby-Dick's signature is quite appropriate: "bad advice is worse than no advice at all".

    I am talking about preventing unauthorised, undetected access to a wireless network - not specifically the machines on the WLAN itself.
    I am trying to give examples of how automated methods could be used to probe for and gain access to such LANs without any expert knowledge, or necessarily the knowledge of the owner of the machine doing it.

    At the same time I am trying to prevent the perpetuation of misinformation and dissuade people from being complacent when it comes to this kind of thing.

    2 modified versions of your quote from above with more truth:
    "the average home network doesn't need super-duper 1024-bit key serverside wireless encryption...yet"
    "the average home network doesn't need super-duper 1024-bit key serverside wireless encryption...but if it is available it may as well be used"

    It does not take fantastic skills or even knowledge of how the underlying technology works for someone to execute a program which was written by someone that does - whether or not the user is aware (so a script-kiddie tool or a worm could use this method).
    WEP encryption has been proven to be weak, MAC filtering is a trivial "extra feature" which becomes more of an administrative hurdle at a later date.

    It's not impossible to imagine a rootkit which is capable of keylogging and self-replication and is "wireless aware" so it is not restricted by wires and is undetectable by any firewall or AV solution.
    Such a process could run on an infected system gathering and transmitting data, breaking into nearby WLANs and spoofing the MAC address - there isn't even a reason to believe that it could identify certain brand wireless APs/routers and know the default admin passwords or maybe exploits to modify the configuration (add its own MAC address, disable logging, etc.).
    ~ I have CDO. It's like OCD except the letters are in alphabetical order, as they should be. ~
    PC: Win10 x64 | Asus Maximus VIII | Core i7-6700K | 16GB DDR3 | 2x250GB SSD | 500GB SSD | 2TB SATA-300 | GeForce GTX1080
    Camera: Canon 60D | Sigma 10-20/4.0-5.6 | Canon 100/2.8 | Tamron 18-270/3.5-6.3

  6. #38
    Senior Member JimmyBoy's Avatar
    Join Date
    Feb 2004
    Location
    BKNL
    Posts
    1,565
    Thanks
    144
    Thanked
    31 times in 27 posts
    • JimmyBoy's system
      • Motherboard:
      • ASUS Maximus VI ROG Hero
      • CPU:
      • Intel i7 4770k @ 4.4ghz
      • Memory:
      • 8GB Corsair Vengeance Pro 2133mhz
      • Storage:
      • 250gb Samsung 840 SSD / 3tb Seagate / 1tb Western Digital
      • Graphics card(s):
      • HiS ATi Radeon HD 7950
      • PSU:
      • Coolermaster GX 650w
      • Case:
      • Bit Fenix Shinobi XL
      • Operating System:
      • Windows 8 Pro x64
      • Monitor(s):
      • 27" LG IPS277L-BN 1920x1080
      • Internet:
      • Virgin Media 120mb down 10mb up
    well, after reading this thread i changed my security from wep to wpa, not entirely sure how it works, but basically now, to connect, rather than entering a network key i had to put a password that i created myself, so i assume its working but how exactly does it work though? perhaps i read it in this thread and my glorious short term memory has forgotten already, but im under the impression it changes something every now n then.

    please explain

  7. #39
    Ex-MSFT Paul Adams's Avatar
    Join Date
    Jul 2003
    Location
    %systemroot%
    Posts
    1,926
    Thanks
    29
    Thanked
    77 times in 59 posts
    • Paul Adams's system
      • Motherboard:
      • Asus Maximus VIII
      • CPU:
      • Intel Core i7-6700K
      • Memory:
      • 16GB
      • Storage:
      • 2x250GB SSD / 500GB SSD / 2TB HDD
      • Graphics card(s):
      • nVidia GeForce GTX1080
      • Operating System:
      • Windows 10 x64 Pro
      • Monitor(s):
      • Philips 40" 4K
      • Internet:
      • 500Mbps fiber
    WPA has been around longer than a lot of people think, there is an article from July 2003 giving an overview of how it works here

    In essence, WEP uses a static key - so once obtained you can get access to the WLAN indefinitely.
    WPA uses dynamic encryption - the keys change frequently so there is a much smaller chance to be able to decrypt a session, as there is an initial key which you dictate then there has to be a point at session setup where this static key (or "pre-shared key", PSK) is used, but very briefly.

    For the best kind of security, which isn't applicable for most home users, you can use a back-end authentication server so the user has to authentication with their credentials (e.g. domain logon) or certificates are used - this is then the same kind of handshake as Kerberos or SSL so is secure from the start.

    And then there is the new WPA2 , just to make things more interesting
    But rather than go into it here, follow that link and there are many docs over at www.wi-fi.org.
    ~ I have CDO. It's like OCD except the letters are in alphabetical order, as they should be. ~
    PC: Win10 x64 | Asus Maximus VIII | Core i7-6700K | 16GB DDR3 | 2x250GB SSD | 500GB SSD | 2TB SATA-300 | GeForce GTX1080
    Camera: Canon 60D | Sigma 10-20/4.0-5.6 | Canon 100/2.8 | Tamron 18-270/3.5-6.3

  8. #40
    Banned StormPC's Avatar
    Join Date
    Sep 2004
    Posts
    1,194
    Thanks
    0
    Thanked
    0 times in 0 posts
    Great posts Paul, thanks!

  9. #41
    Goron goron Kumagoro's Avatar
    Join Date
    Mar 2004
    Posts
    3,154
    Thanks
    38
    Thanked
    172 times in 140 posts
    This is how easy it is to change your MAC address.

    For Win XP,
    http://www.klcconsulting.net/smac/
    http://students.washington.edu/natetrue/macshift/ (i use this)

    For 98 (which is very easy and needs no prog)

    http://www.klcconsulting.net/Change_MAC_w98.htm

Page 3 of 3 FirstFirst 123

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Similar Threads

  1. Benq AWL700 802.11b Wireless Access Point + Switching Hub - £25.79
    By Tifosi in forum Retail Therapy and Bargains
    Replies: 6
    Last Post: 20-05-2004, 03:09 PM
  2. Replies: 8
    Last Post: 22-01-2004, 03:11 AM
  3. Wireless Access point £23
    By daveham in forum Retail Therapy and Bargains
    Replies: 5
    Last Post: 12-09-2003, 11:30 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •