Results 1 to 16 of 16

Thread: Wireless Security - info please!

  1. #1
    Nox
    Nox is offline
    Vorsprung durch Technik
    Join Date
    Oct 2003
    Location
    Hampshire
    Posts
    2,023
    Thanks
    2
    Thanked
    2 times in 2 posts
    • Nox's system
      • Motherboard:
      • Yes
      • CPU:
      • Yes
      • Memory:
      • Yes
      • Storage:
      • Yes
      • Graphics card(s):
      • Yes
      • PSU:
      • Yes
      • Case:
      • Yes
      • Monitor(s):
      • Yes
      • Internet:
      • Yes

    Wireless Security - info please!

    Being the paranoid bugger I am, i've completely and utterly ignored/never bothered with wireless with the view that i'd never use it!!

    Times change... /sigh and i've just received a brand spanking wireless router from my ISP, so before this gets enabled i'm looking for either some decent online guides, or a glowing report on a book.

    Does anyone have recommendations?

    Nox

  2. #2
    radix lecti dave87's Avatar
    Join Date
    Sep 2005
    Location
    England
    Posts
    12,806
    Thanks
    657
    Thanked
    931 times in 634 posts
    • dave87's system
      • Motherboard:
      • Asus
      • CPU:
      • i5 3470k under Corsair H80 WC
      • Memory:
      • 8gb DDR3
      • Storage:
      • 240gb SSD + 120gb SSD
      • Graphics card(s):
      • Asus HD7950
      • PSU:
      • XFX 600w Modular
      • Case:
      • Lian Li PC-A05FNB + Acoustipack
      • Operating System:
      • Windows 10 Pro
      • Monitor(s):
      • 2x Dell S2309W (1920x1080)
      • Internet:
      • BT Infinity Option 2
    Never bothered reading a book, just went and set mine up, so a few tips instead of a guide

    When you set it up, if you are only going to have a set number of pcs (the same ones day in day out) using it, there should be a function to filter by MAC address which you can use. Otherwise WPA-PSK is probably the best way to secure the wireless with the minimum of fuss , just make sure you get the PreShared Key the same on all PCS (unlike moi the first time I set it up )

  3. #3
    Senior Member
    Join Date
    Aug 2004
    Location
    W Yorkshire
    Posts
    5,691
    Thanks
    85
    Thanked
    15 times in 13 posts
    • XA04's system
      • Motherboard:
      • MSI X570-A Pro
      • CPU:
      • AMD Ryzen 5 3600
      • Memory:
      • Corsair 2x 8gb DDR 4 3200
      • Storage:
      • 1TB Serpent M.2 SSD & 4TB HDD
      • Graphics card(s):
      • Palit RTX 2060
      • PSU:
      • Antec Truepower 650W
      • Case:
      • Fractcal Meshify C
      • Operating System:
      • Windows 10
      • Monitor(s):
      • iiyama 34" Curved UWQHD
      • Internet:
      • Virgin 100mb Fibre
    As dave87 said, only allow computers with the MAC codes assigned to have access to the network (that's very good security right away).


    For wireless encryption, don't use WEP (even if it does sound good with it's 64/128/256 bit encryption), because it can be cracked very easily. - And obviously, use a long, strong password. If you use a weak 3 letter password then no matter what encryption you use it could be brute forced easily.


    WPA-PSK is the best to use really, most manufacturers have it as an option.. if not try updating the firmware.

  4. #4
    Nox
    Nox is offline
    Vorsprung durch Technik
    Join Date
    Oct 2003
    Location
    Hampshire
    Posts
    2,023
    Thanks
    2
    Thanked
    2 times in 2 posts
    • Nox's system
      • Motherboard:
      • Yes
      • CPU:
      • Yes
      • Memory:
      • Yes
      • Storage:
      • Yes
      • Graphics card(s):
      • Yes
      • PSU:
      • Yes
      • Case:
      • Yes
      • Monitor(s):
      • Yes
      • Internet:
      • Yes
    Thanks Was hoping to find something a bit stronger than 'run of the mill' to attempt to make anyone move along next door though! See above note about paranoia!

    Nox

  5. #5
    Member
    Join Date
    Nov 2005
    Location
    South London
    Posts
    135
    Thanks
    0
    Thanked
    0 times in 0 posts
    Just make sure that you know how to set it up on your particular router. Some, like my Dlink have Restart AP and Restart for instance and you must save your changes then do the appropriate restart.

    WPA-PSK easy.

    Of course - make a note of all your ISP settings and the new security settings, just in case you have to return to factory settings and also so when you need them you have the settings for permissioning other clients.

    If you don't have a manual detailing the processes, get a PDF from your ISP/manufacturer before proceeding to go wireless.
    Blackspeech
    'From the abundance of the heart the mouth speaks'

  6. #6
    Senior Member
    Join Date
    Aug 2005
    Location
    Northern Ireland
    Posts
    492
    Thanks
    23
    Thanked
    10 times in 10 posts
    • geezerone's system
      • Motherboard:
      • Gigabyte GA-870-UD3 (AM3)
      • CPU:
      • AMD Athlon II x4 640
      • Memory:
      • Corsair Vengeance LP 8GB (2x4GB) 1600Mhz
      • Storage:
      • 1TB and 2TB Seagate 7200.14
      • Graphics card(s):
      • Gigabyte GTX 460 1GB OC
      • PSU:
      • Corsair VX550
      • Case:
      • Antec 300
      • Operating System:
      • Windows 7 (64bit)
      • Monitor(s):
      • LG W2442PA-BF
      • Internet:
      • Plusnet FTTC 40/10 'Unlimited'
    Yep, just started using wireless myself and went for WPA encryption. Use MAC address of the WIRELESS adaptor and not the wired one (at run prompt type: ipconfig/all and note the wireless MAC address down). Use alphanumeric characters for the shared key and use 8 or more characters.

    You should also configure on each client that the MAC of your new router is the only one they will connect to and also rename the Wireless connection from its default option to an ambiguous name.

    You can never be too secure remember so your paranoia isn't all bad!
    Anantech Benchmarking Tool for CPU, GPU and SSDs

  7. #7
    Administrator Moby-Dick's Avatar
    Join Date
    Jul 2003
    Location
    There's no place like ::1 (IPv6 version)
    Posts
    10,665
    Thanks
    53
    Thanked
    384 times in 313 posts
    Actually MAC address restriction is easier to break than WEP

    WAP or WPA2 is the way to go.

    You could also use static IP's so that clients dont automatically get handed an IP if they connect.

    In an enterprise situation , you'd have the wireless segment seperate to the LAN and require users to connect back to the LAN via a VPN for example.
    my Virtualisation Blog http://jfvi.co.uk Virtualisation Podcast http://vsoup.net

  8. #8
    HEXUS.social member Agent's Avatar
    Join Date
    Jul 2003
    Location
    Internet
    Posts
    19,185
    Thanks
    738
    Thanked
    1,609 times in 1,048 posts
    http://www.winguides.com/security/password.php
    Great for making WPA-PSK's

    Mixed letters + numbers, max length, works great
    Just make sure you have a copy somwhere

  9. #9
    Senior Member FatalSaviour's Avatar
    Join Date
    Jun 2004
    Location
    London/Oxford/York
    Posts
    1,876
    Thanks
    42
    Thanked
    12 times in 11 posts
    • FatalSaviour's system
      • Motherboard:
      • MSI P55-GD80
      • CPU:
      • Intel Core i7 860
      • Memory:
      • 4x2GB GEiL PC17000
      • Storage:
      • 3x1000GB, 2x500GB (RAID1), 1x2TB
      • Graphics card(s):
      • GTX 470
      • PSU:
      • Corsair HX700
      • Case:
      • Antec P180
      • Operating System:
      • Win 7 x64
      • Monitor(s):
      • Dell U2311, Dell 2005FPW
      • Internet:
      • VM 30Mb
    Hiding the SSID once setup would be a bonus too.
    Quote Originally Posted by Noni
    What the hell does "WTH" mean


  10. #10
    radix lecti dave87's Avatar
    Join Date
    Sep 2005
    Location
    England
    Posts
    12,806
    Thanks
    657
    Thanked
    931 times in 634 posts
    • dave87's system
      • Motherboard:
      • Asus
      • CPU:
      • i5 3470k under Corsair H80 WC
      • Memory:
      • 8gb DDR3
      • Storage:
      • 240gb SSD + 120gb SSD
      • Graphics card(s):
      • Asus HD7950
      • PSU:
      • XFX 600w Modular
      • Case:
      • Lian Li PC-A05FNB + Acoustipack
      • Operating System:
      • Windows 10 Pro
      • Monitor(s):
      • 2x Dell S2309W (1920x1080)
      • Internet:
      • BT Infinity Option 2
    Quote Originally Posted by Moby-Dick
    Actually MAC address restriction is easier to break than WEP

    WAP or WPA2 is the way to go.

    You could also use static IP's so that clients dont automatically get handed an IP if they connect.

    In an enterprise situation , you'd have the wireless segment seperate to the LAN and require users to connect back to the LAN via a VPN for example.
    As long as people have no reason to get into your network - apart from stealing the internet connection, then as long as your network is the most secure out of the available ones, 'hackers' will go for the easier target. A combination of static IPs, mac address filtering, hidden SSID and WPA should deter most from trying, though if you have got valuable data then as moby said, you would split the network

  11. #11
    Senior Member
    Join Date
    Aug 2005
    Location
    Northern Ireland
    Posts
    492
    Thanks
    23
    Thanked
    10 times in 10 posts
    • geezerone's system
      • Motherboard:
      • Gigabyte GA-870-UD3 (AM3)
      • CPU:
      • AMD Athlon II x4 640
      • Memory:
      • Corsair Vengeance LP 8GB (2x4GB) 1600Mhz
      • Storage:
      • 1TB and 2TB Seagate 7200.14
      • Graphics card(s):
      • Gigabyte GTX 460 1GB OC
      • PSU:
      • Corsair VX550
      • Case:
      • Antec 300
      • Operating System:
      • Windows 7 (64bit)
      • Monitor(s):
      • LG W2442PA-BF
      • Internet:
      • Plusnet FTTC 40/10 'Unlimited'
    Don't agree with the MAC lack of security it surely can only help against people scanning. Yep, a combination of MAC, WPA, fixed IP would give most the best resonably straightforward to configure setup. I don't use wireless for anything such as online shopping or banking as no wireless connection is unbreakable by its nature and use a wired connection for that.
    Anantech Benchmarking Tool for CPU, GPU and SSDs

  12. #12
    Senior Member
    Join Date
    Aug 2004
    Location
    W Yorkshire
    Posts
    5,691
    Thanks
    85
    Thanked
    15 times in 13 posts
    • XA04's system
      • Motherboard:
      • MSI X570-A Pro
      • CPU:
      • AMD Ryzen 5 3600
      • Memory:
      • Corsair 2x 8gb DDR 4 3200
      • Storage:
      • 1TB Serpent M.2 SSD & 4TB HDD
      • Graphics card(s):
      • Palit RTX 2060
      • PSU:
      • Antec Truepower 650W
      • Case:
      • Fractcal Meshify C
      • Operating System:
      • Windows 10
      • Monitor(s):
      • iiyama 34" Curved UWQHD
      • Internet:
      • Virgin 100mb Fibre
    Quote Originally Posted by Moby-Dick
    Actually MAC address restriction is easier to break than WEP

    WAP or WPA2 is the way to go.

    You could also use static IP's so that clients dont automatically get handed an IP if they connect.

    In an enterprise situation , you'd have the wireless segment seperate to the LAN and require users to connect back to the LAN via a VPN for example.
    I believe there is a way of changing your MAC code (or at least, making it appear as something else). But even if you did do something like that, you would still need to know the MAC address of what your trying to be... that's what an attacker would struggle with.

  13. #13
    Drop it like it's hot Howard's Avatar
    Join Date
    Jul 2003
    Location
    Surrey, South East
    Posts
    11,731
    Thanks
    14
    Thanked
    42 times in 39 posts
    • Howard's system
      • Motherboard:
      • Asus P5B
      • CPU:
      • Core2Duo E6420 2.13GHz
      • Memory:
      • 2x1gb OCZ DDR2 6400
      • Storage:
      • 250GB & 500GB Seagate
      • Graphics card(s):
      • Inno3d iChill 7900GS
      • PSU:
      • Antec SmartPower 500W
      • Case:
      • Coolermaster Elite 330
      • Monitor(s):
      • 2x AG Neovo F419
      • Internet:
      • Virgin Media 20mbit
    You can change it in Windows. Makes setting up NTL internet connections easy
    Home cinema: Toshiba 42XV555DB Full HD LCD | Onkyo TX-SR705 | NAD C352 | Monitor Audio Bronze B2 | Monitor Audio Bronze C | Monitor Audio Bronze BFX | Yamaha NSC120 | BK Monolith sub | Toshiba HD-EP35 HD-DVD | Samsung BD-P1400 BluRay Player | Pioneer DV-575 | Squeezebox3 | Virgin Media V+ Box
    PC: Asus P5B | Core2duo 2.13GHz | 2GB DDR2 PC6400 | Inno3d iChill 7900GS | Auzentech X-Plosion 7.1 | 250GB | 500GB | NEC DVDRW | Dual AG Neovo 19"
    HTPC: | Core2Duo E6420 2.13GHz | 2GB DDR2 | 250GBx2 | Radeon X1300 | Terratec Aureon 7.1 | Windows MCE 2005
    Laptop: 1.5GHz Centrino | 512MB | 60GB | 15" Wide TFT | Wifi | DVDRW


  14. #14
    Senior Member FatalSaviour's Avatar
    Join Date
    Jun 2004
    Location
    London/Oxford/York
    Posts
    1,876
    Thanks
    42
    Thanked
    12 times in 11 posts
    • FatalSaviour's system
      • Motherboard:
      • MSI P55-GD80
      • CPU:
      • Intel Core i7 860
      • Memory:
      • 4x2GB GEiL PC17000
      • Storage:
      • 3x1000GB, 2x500GB (RAID1), 1x2TB
      • Graphics card(s):
      • GTX 470
      • PSU:
      • Corsair HX700
      • Case:
      • Antec P180
      • Operating System:
      • Win 7 x64
      • Monitor(s):
      • Dell U2311, Dell 2005FPW
      • Internet:
      • VM 30Mb
    I wasn't aware ntl employed MAC restrictions any more?
    Quote Originally Posted by Noni
    What the hell does "WTH" mean


  15. #15
    Ex-MSFT Paul Adams's Avatar
    Join Date
    Jul 2003
    Location
    %systemroot%
    Posts
    1,926
    Thanks
    29
    Thanked
    77 times in 59 posts
    • Paul Adams's system
      • Motherboard:
      • Asus Maximus VIII
      • CPU:
      • Intel Core i7-6700K
      • Memory:
      • 16GB
      • Storage:
      • 2x250GB SSD / 500GB SSD / 2TB HDD
      • Graphics card(s):
      • nVidia GeForce GTX1080
      • Operating System:
      • Windows 10 x64 Pro
      • Monitor(s):
      • Philips 40" 4K
      • Internet:
      • 500Mbps fiber
    Quote Originally Posted by XA04
    I believe there is a way of changing your MAC code (or at least, making it appear as something else). But even if you did do something like that, you would still need to know the MAC address of what your trying to be... that's what an attacker would struggle with.
    MAC address restrictions will only deter a passer-by - anyone spending any time near your access point while you use it could pick up your MAC address from the millions of packets sent back & forth - the same with non-broadcast ("hidden") SSIDs - they can be seen too as your client has to associate itself with the WLAN.

    You often don't need software to change your MAC, many network interface drivers have the option to enter a hardware address through the driver, overriding the built-in address.


    WPA-PSK with a decent key is the way to go, and inhibiting SSID broadcasts can just cause you problems getting a connection from your own client instead of affording you extra security.

    MAC address restrictions and disabling DHCP can just create administrative overhead - these are also "shutting the stable door after the horse has bolted", as anyone able to break the encryption would have zero problems sniffing the packets to get MACs & IP addresses to use the network.
    ~ I have CDO. It's like OCD except the letters are in alphabetical order, as they should be. ~
    PC: Win10 x64 | Asus Maximus VIII | Core i7-6700K | 16GB DDR3 | 2x250GB SSD | 500GB SSD | 2TB SATA-300 | GeForce GTX1080
    Camera: Canon 60D | Sigma 10-20/4.0-5.6 | Canon 100/2.8 | Tamron 18-270/3.5-6.3

  16. #16
    Administrator Moby-Dick's Avatar
    Join Date
    Jul 2003
    Location
    There's no place like ::1 (IPv6 version)
    Posts
    10,665
    Thanks
    53
    Thanked
    384 times in 313 posts
    Quote Originally Posted by XA04
    I believe there is a way of changing your MAC code (or at least, making it appear as something else). But even if you did do something like that, you would still need to know the MAC address of what your trying to be... that's what an attacker would struggle with.
    What information do you think is shown when you run a packet sniffer ?

    thats right...the MAC addresses of nodes talking on the network
    my Virtualisation Blog http://jfvi.co.uk Virtualisation Podcast http://vsoup.net

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Similar Threads

  1. Best security method on wireless
    By Pazza in forum Networking and Broadband
    Replies: 15
    Last Post: 18-12-2005, 08:52 PM
  2. HEXUS.guides :: Wireless security
    By Steve in forum HEXUS Reviews
    Replies: 5
    Last Post: 19-09-2005, 07:23 PM
  3. wireless security.....
    By JimmyBoy in forum Networking and Broadband
    Replies: 3
    Last Post: 29-03-2005, 10:40 PM
  4. Wired+Wireless home network purchasing recommendations...
    By D001 in forum Networking and Broadband
    Replies: 4
    Last Post: 01-09-2003, 11:03 AM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •