Go Back   IceInSpace > Equipment > Software and Computers
Register FAQ Calendar Today's Posts Search

Reply
 
Thread Tools Rate Thread
  #1  
Old 21-12-2012, 06:52 PM
GeoffW1's Avatar
GeoffW1 (Geoff)
Registered User

GeoffW1 is offline
 
Join Date: Sep 2006
Location: Sydney
Posts: 1,847
Wireless network security for IIS geeks

Hi,

Many of us would be using wireless networks at home, perhaps always on. There are a few different standards for encryption, the oldest one of which, WEP, is easy to crack. I was alarmed to find I was still using it! I bought a new router/modem unit as a result. It uses WPA2, if you are parked outside my place The newest standard is WPS, but my computer could not handle it Now it seems WPS might not be the ant's pants after all.

Some info (safe site)

https://windowssecrets.com/newslette...unsafe/#story1

https://windowssecrets.com/top-story...y-to-the-test/

If you can understand all this let us know We will appoint you guardian of the Netgear Gateway

Cheers
Reply With Quote
  #2  
Old 21-12-2012, 07:03 PM
Astro_Bot's Avatar
Astro_Bot
Registered User

Astro_Bot is offline
 
Join Date: Jun 2012
Location: Brisbane
Posts: 1,605
Everywhere I've worked has banned Wi-Fi (for good reason, as far as I can see).

I don't use it at home, though I might in a hotel, for example, as there seems little additional risk compared to a "public" internet connection.
Reply With Quote
  #3  
Old 21-12-2012, 09:02 PM
supernova1965's Avatar
supernova1965 (Warren)
Buddhist Astronomer

supernova1965 is offline
 
Join Date: Aug 2009
Location: Phillip Island,VIC, Australia
Posts: 4,073
I use several different security measures one is never enough a good password wpa 2 and MAC address blocking I have never been hacked so I must be doing something right.
Reply With Quote
  #4  
Old 21-12-2012, 09:27 PM
Astro_Bot's Avatar
Astro_Bot
Registered User

Astro_Bot is offline
 
Join Date: Jun 2012
Location: Brisbane
Posts: 1,605
Quote:
Originally Posted by supernova1965 View Post
I have never been hacked so I must be doing something right.
That's not proof of anything! I could just as well say that I've never been shot, so I must be impervious to bullets.
Reply With Quote
  #5  
Old 21-12-2012, 09:32 PM
tlgerdes's Avatar
tlgerdes (Trevor)
Love the moonless nights!

tlgerdes is offline
 
Join Date: Mar 2009
Location: Sydney
Posts: 2,285
Quote:
Originally Posted by supernova1965 View Post
I use several different security measures one is never enough a good password wpa 2 and MAC address blocking I have never been hacked so I must be doing something right.
Or you just don't know that someone else owns your ass!

Quote:
Originally Posted by Astro_Bot View Post
That's not proof of anything! I could just as well say that I've never been shot, so I must be impervious to bullets.
Reply With Quote
  #6  
Old 22-12-2012, 02:56 AM
AstroJunk's Avatar
AstroJunk (Jonathan)
Shadow Chaser

AstroJunk is offline
 
Join Date: Jan 2006
Location: Moonee Beach
Posts: 1,945
Quote:
Originally Posted by supernova1965 View Post
I use several different security measures one is never enough a good password wpa 2 and MAC address blocking I have never been hacked so I must be doing something right.

+1 for MAC address blocking. That will all but sort out access to your network - and funny how that article never mentions this basic and fairly robust security measure.

Any wireless data can be intercepted and brute force decoded by a suitably determined person. The question you have to ask though is 'what are you moving across your wireless network (unprotected by https) that anyone will be able to use?' If you believe that your network traffic is that sensitive, then don't send it.

Despite our paranoia, there are far easier ways to steal identities and personal details than snooping wi-fi. Given the choice over sitting outside your house for hours waiting for something interesting to be transmitted versus breaking a window and pinching your wallet...

Get yourselves a safety deposit box at your bank if you really care. There is nothing on any of my computers, or in my filling cabinet that will allow a crook access to the only thing I ultimately care about beyond family - My bank account!
Reply With Quote
  #7  
Old 22-12-2012, 03:16 AM
Astro_Bot's Avatar
Astro_Bot
Registered User

Astro_Bot is offline
 
Join Date: Jun 2012
Location: Brisbane
Posts: 1,605
Quote:
MAC address blocking.
It slows things down a lot, but MAC spoofing (and a whole lot more) is pretty easy, so it's no panacea. If you can guess the router vendor, you can often narrow down the MAC range.

The general rule you mention is true: if you don't want anyone to know, don't put it on an internet-facing network, because it's mostly just a cheap, opaque and only partially-configurable router/firewall between you and ... well, everyone.

I think this comic sums things up fairly well: http://xkcd.com/538/

Last edited by Astro_Bot; 22-12-2012 at 05:54 AM. Reason: Still awake, so may as well
Reply With Quote
  #8  
Old 22-12-2012, 07:01 AM
troypiggo's Avatar
troypiggo (Troy)
Bust Duster

troypiggo is offline
 
Join Date: Nov 2008
Location: Brisbane, Australia
Posts: 4,846
Cool! I'm bullet-proof!
Reply With Quote
  #9  
Old 22-12-2012, 08:29 AM
supernova1965's Avatar
supernova1965 (Warren)
Buddhist Astronomer

supernova1965 is offline
 
Join Date: Aug 2009
Location: Phillip Island,VIC, Australia
Posts: 4,073
Quote:
Originally Posted by Astro_Bot View Post
That's not proof of anything! I could just as well say that I've never been shot, so I must be impervious to bullets.
Wireless security is never 100% safe all you can do is make so difficult that the perp doesn't think it is worth the time to break in given enough time you can break any system but that increases their risk of discovery so they move on to an easy target.
Quote:
Originally Posted by tlgerdes View Post
Or you just don't know that someone else owns your ass!



Any IT tech worth his or her weight in gold can tell when something isn't right there are always signs that someone has hacked you if you pay attention
Reply With Quote
  #10  
Old 22-12-2012, 08:43 AM
Astro_Bot's Avatar
Astro_Bot
Registered User

Astro_Bot is offline
 
Join Date: Jun 2012
Location: Brisbane
Posts: 1,605
Quote:
Originally Posted by supernova1965 View Post
Any IT tech worth his or her weight in gold
I'd like to see that!

Quote:
can tell when something isn't right there are always signs that someone has hacked you if you pay attention
Some intrusions go for months undetected (just ask the Pentagon) but the real question is how many are never detected? If you listen to the crackers on underground forums, a good proportion are never discovered.
Reply With Quote
  #11  
Old 22-12-2012, 09:29 AM
alistairsam's Avatar
alistairsam
Registered User

alistairsam is offline
 
Join Date: Nov 2009
Location: Box Hill North, Vic
Posts: 1,837
How about wireless with 2 factor RSa authentication and wpa2-aes? I know rsa was compromised earlier but a repeat would require a number of variables to be right. Most lwaap ap's use ssl tunnels to the wlc.
Also, I thought wpa2 was not yet compromised other than one Japanese professor demonstrating that it could be. That was a while ago though.
Reply With Quote
  #12  
Old 22-12-2012, 11:11 AM
Barrykgerdes
Registered User

Barrykgerdes is offline
 
Join Date: Feb 2007
Location: Beaumont Hills NSW
Posts: 2,900
I just use mac addresses on my wifi (for convenience more than security) so if anyone wants to hack mine be my guest. Even mac addresses are a nuisance to set up sometimes. My wifi does not recognise new clients unless the signal is strong and even then I need to look up the mac address and enter it manually most of the time.

If you can get anything worth while I would be interested because it may be useful to me. If you are worried about security on a computer just don't use it to store anything that you don't want the world to know.

Barry

PS Years ago when DOS was king I had my office computer HD arranged into multiple drives. I kept all the games and pirated programs on hidden drive "G" and used an innocuous batch file with encoded non keyboard characters to access the drives.
The IT people used to come around with a disk to examine your computer for stuff that shouldn't be there. It never ever found my "special" drives. BG

Last edited by Barrykgerdes; 22-12-2012 at 11:21 AM.
Reply With Quote
  #13  
Old 22-12-2012, 11:25 AM
FlashDrive's Avatar
FlashDrive (Poppy)
Senior Citizen

FlashDrive is offline
 
Join Date: Apr 2008
Location: Bribie Island
Posts: 5,068
I'm not an expert on this sort of stuff ... ( I know enough to keep me out of trouble ) but what about using ' packet inspection '
If you haven't requested it through your firewall ...then the firewall ( a decent one ) should block / reject any incoming data / ping etc.

Another thing ... anything trying to ' phone home ' with your data .... it would be great if it was sent to an IP Address of 127.0.0.1 ...in other words...no mans land ... a dead end....or just keeps ' looping '

One other thing ...make sure your file sharing port 139 ( Net BIOS ) is either closed ( a hacker with a port scanner will still see it and may return later to see if it is open ) ... or better still ..Port 139 is in 'Stealth' mode ...can't be seen.

Below is a report on my Computer's vulnerability to the Internet.... done a few minutes ago.
I deliberately requested a server in Colorado USA to do a ' packet inspection' on my Computer.

My Computer refused to ' respond ' to the ' intrusion '

GRC Port Authority Report created on UTC: 2012-12-22 at 00:39:14 Results from scan of ports: 0, 21-23, 25, 79, 80, 110, 113, 119, 135, 139, 143, 389, 443, 445, 1002, 1024-1030, 1720, 5000 0 Ports Open 0 Ports Closed 26 Ports Stealth --------------------- 26 Ports Tested ALL PORTS tested were found to be: STEALTH. TruStealth: PASSED - ALL tested ports were STEALTH, - NO unsolicited packets were received, - NO Ping reply (ICMP Echo) was received.


Attempting connection to your computer. . .
Shields UP! is now attempting to contact the Hidden Internet Server within your PC. It is likely that no one has told you that your own personal computer may now be functioning as an Internet Server with neither your knowledge nor your permission. And that it may be serving up all or many of your personal files for reading, writing, modification and even deletion by anyone, anywhere, on the Internet!
Your Internet port 139 does not appear to exist!
One or more ports on this system are operating in FULL STEALTH MODE! Standard Internet behavior requires port connection attempts to be answered with a success or refusal response. Therefore, only an attempt to connect to a nonexistent computer results in no response of either kind. But YOUR computer has DELIBERATELY CHOSEN NOT TO RESPOND (that's very cool!) which represents advanced computer and port stealthing capabilities. A machine configured in this fashion is well hardened to Internet NetBIOS attack and intrusion.
Unable to connect with NetBIOS to your computer.
All attempts to get any information from your computer have FAILED. (This is very uncommon for a Windows networking-based PC.) Relative to vulnerabilities from Windows networking, this computer appears to be VERY SECURE since it is NOT exposing ANY of its internal NetBIOS networking protocol over the Internet.


I am using both Wireless and Ethernet cable connected Computers to the Internet.

Flash ..!!

Attached Thumbnails
Click for full-size image (ScreenShot001.jpg)
200.0 KB48 views
Click for full-size image (ScreenShot002.jpg)
207.3 KB34 views

Last edited by FlashDrive; 23-12-2012 at 09:10 AM.
Reply With Quote
  #14  
Old 28-12-2012, 08:45 AM
04Stefan07 (Stefan)
Make it so! - Capt.Picard

04Stefan07 is offline
 
Join Date: Jan 2012
Location: Melbourne
Posts: 1,982
I use WPA2 encryption with my wireless at home.

If you want to add extra protection to your wireless network hide the broadcast SSID. So when you want to connect to the network your modem will not show and will have to enter the SSID, security encryption type and password manually. This is people with wireless modems who live around you can't pick up your modem at all unless they know the name and other credentials.
Reply With Quote
  #15  
Old 29-12-2012, 11:17 AM
mithrandir's Avatar
mithrandir (Andrew)
Registered User

mithrandir is offline
 
Join Date: Jan 2009
Location: Glenhaven
Posts: 4,161
Quote:
Originally Posted by 04Stefan07 View Post
I use WPA2 encryption with my wireless at home.

If you want to add extra protection to your wireless network hide the broadcast SSID. So when you want to connect to the network your modem will not show and will have to enter the SSID, security encryption type and password manually. This is people with wireless modems who live around you can't pick up your modem at all unless they know the name and other credentials.
Stefan, hiding the SSID doesn't help much. Some devices won't connect, and anyone with a wireless sniffer will eventually pick up connection packets containing the SSID. WPA2 with a complex passphrase is about as good as shared secret crypto gets at the moment. If you want more, you need centralised security like Radius, and I've never got that to work on my network.
Reply With Quote
  #16  
Old 29-12-2012, 11:24 AM
multiweb's Avatar
multiweb (Marc)
ze frogginator

multiweb is offline
 
Join Date: Oct 2007
Location: Sydney
Posts: 22,078
Quote:
Originally Posted by mithrandir View Post
Stefan, hiding the SSID doesn't help much. Some devices won't connect, and anyone with a wireless sniffer will eventually pick up connection packets containing the SSID. WPA2 with a complex passphrase is about as good as shared secret crypto gets at the moment. If you want more, you need centralised security like Radius, and I've never got that to work on my network.
WPA2 is as good as it gets for now. I mean still practical for a home user. If you use MAC addresses you can further control connections to your network. It's just a little longer to set up but it's a one of and then you can leave it as is. Only recognised devices will be able to connect as it's restrictive. Hiding your SSID is like shoving you head in the sand. Any kiddy will find it in about 5min or so. Just make your pwd long and mixed with symbols and alpha numeric characters.
Reply With Quote
  #17  
Old 29-12-2012, 05:59 PM
Eggmoon (Geoff)
General all round geek

Eggmoon is offline
 
Join Date: Nov 2012
Location: Melbourne
Posts: 119
All very good points above.

There is no 100% protection against being hijacked. But it comes back to doing as much as you can to make it as hard as possible.

If someone is wanting to steal WiFi, they are likely to pick up several sources from where ever they sit and do their detection. They will always go for the easier targets first... so if yours has as much security as possible, you go to the bottom of their hit list.

So far I have not had any break ins to my home setup... WPA2, AES, Hidden SSID, Long tricky pass-phrase, and my router set up so it only has enough IP addresses for the devices I connect with, and I change the pass-phrase now and then.

When I was running my own e-mail server (dont do it anymore) I was constantly being attacked over the net, always unsucsessfully. But so far no one has gotten into my setup... via net or WiFi. I say so far... becasue I dont want to be complaicent.

Keep all your gear updated with the latest security patches, pick a router with a good firewall, run anti-virus / anti-malware software, don't visit too many dodgey web sites and become infected with trojans and bots, put as much security as you can on your Wifi.

After that you have done as much as you can... an expert with enough time and motivation would still be able to get in... but I cant see why any one would spend the effort needed to hack me when there are much easier targets around.
Reply With Quote
  #18  
Old 20-01-2013, 04:58 PM
deadsimple's Avatar
deadsimple (Ash)
Registered User

deadsimple is offline
 
Join Date: Sep 2008
Location: Brisbane
Posts: 180
For most purposes the combination of the following two security measures will suffice:

  1. WPA2 (AES) with a reasonably long password (12+ characters with non-dictionary words and letters)
  2. A unique SSID of good length with non-dictionary and non-company-name words/letters.
This is all you need and your network will unlikely be overcome by even the most seasoned hacker from the wireless side. Obviously if your computer is virus/trojan infested or if you use Internet Explorer, then your chances of leaking information through the Internet side through phone-home software skyrockets.

MAC address filtering and SSID hiding can be overcome by a novice with any of the dozens of automated hacking programs that are a google search away, and should only be used as temporary measures if you're unable to utilise WPA2 for whatever reason in the short-term.

They have the added disadvantage of being a headache and obstacle when you're trying to legitimately manage a dozen wireless devices on your network (phones, laptops, tablets, TV/media players, etc).

Recommendations to use just MAC filtering or SSID hiding based on anecdotal evidence of "I haven't been hacked yet" is unfortunately doing other people here a disservice, as they may be in more dense areas where there are more "eyes" that may take an interest in the network.
Reply With Quote
  #19  
Old 20-01-2013, 05:16 PM
supernova1965's Avatar
supernova1965 (Warren)
Buddhist Astronomer

supernova1965 is offline
 
Join Date: Aug 2009
Location: Phillip Island,VIC, Australia
Posts: 4,073
Quote:
Originally Posted by deadsimple View Post
For most purposes the combination of the following two security measures will suffice:

  1. WPA2 (AES) with a reasonably long password (12+ characters with non-dictionary words and letters)
  2. A unique SSID of good length with non-dictionary and non-company-name words/letters.
This is all you need and your network will unlikely be overcome by even the most seasoned hacker from the wireless side. Obviously if your computer is virus/trojan infested or if you use Internet Explorer, then your chances of leaking information through the Internet side through phone-home software skyrockets.

MAC address filtering and SSID hiding can be overcome by a novice with any of the dozens of automated hacking programs that are a google search away, and should only be used as temporary measures if you're unable to utilise WPA2 for whatever reason in the short-term.

They have the added disadvantage of being a headache and obstacle when you're trying to legitimately manage a dozen wireless devices on your network (phones, laptops, tablets, TV/media players, etc).

Recommendations to use just MAC filtering or SSID hiding based on anecdotal evidence of "I haven't been hacked yet" is unfortunately doing other people here a disservice, as they may be in more dense areas where there are more "eyes" that may take an interest in the network.
No-one said too use MAC filtering and SSID hiding alone to protect the network but every layer that makes the intruder have to spend more time parked outside your house means they are closer to being discovered. The idea is to make it slower to invade so they move on to easier targets.
Reply With Quote
  #20  
Old 20-01-2013, 05:46 PM
deadsimple's Avatar
deadsimple (Ash)
Registered User

deadsimple is offline
 
Join Date: Sep 2008
Location: Brisbane
Posts: 180
Quote:
Originally Posted by supernova1965 View Post
No-one said too use MAC filtering and SSID hiding alone to protect the network
Are you sure?

Quote:
Originally Posted by AstroJunk View Post
+1 for MAC address blocking. That will all but sort out access to your network - and funny how that article never mentions this basic and fairly robust security measure.
Sounds like a fairly strong recommendation that MAC filtering is all you need.

Quote:
but every layer that makes the intruder have to spend more time parked outside your house means they are closer to being discovered. The idea is to make it slower to invade so they move on to easier targets.
I can see where you're coming from, but my point is that with a strong WPA2 password with good SSID, you don't need to make it slower to invade, as they are stopped dead in their tracks purely from the mathematical barrier presented by the encryption in the WPA2 standard.

If the standard was a bit weaker and easier to overcome then I'd be agreeing with you about extra layers of security, but in my opinion adding MAC filtering and SSID hiding on top of WPA2 is completely unnecessary.
Reply With Quote
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump


All times are GMT +10. The time is now 08:45 AM.

Powered by vBulletin Version 3.8.7 | Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
Advertisement
Bintel
Advertisement