It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by CX
Not sure where to put this, hope this is ok here.
The other night i was watching a documentary on hackers. Part of the documentary showed the work of "ethical hackers" who did legitimate hacking to show busineses where thier weaknesses were in their computer systems.
One hacker drove towards Capitol Hill whilst explaining to the viewers about security flaws that come with the new wireless computing. He has set up a scanner type device in his car which beeped everytime he drove by a building which was using wireless systems. He then received the details of that business and information on thier computer system within seconds, straight to his laptop in the car. He explained that in a few seconds he could easily get into the computers he had received info on.
As he drove further up into the maze of government buildings, his scanning was beeping like crazy, indicating the amount of systems housed in goverment buildings that could be accessed so easily. Now it does'nt take a genius to realise that some of the info in those computers around that location may be a tad sensitive. It just seemed like a major lapse in basic computer security to me.
Anyway back to my original question, is wireless computing a lot more vunerable than the normal sytems? Is it worth purchasing?
Thanks,
CX.
1. SSID : DONT BROADCAST THIS!!!
Originally posted by apc
1. SSID : DONT BROADCAST THIS!!!
don't bother. You can still see the radio, it just wont show a name. A few minutes with an air sniffer will reveal it.
[edit on 11-5-2006 by apc]
You have voted johnsky for the Way Above Top Secret award. You have one more vote left for this month.
Originally posted by Gemwolf
LoL! Some people watch too much TV... Reminder - what you see in the movies are called fiction.
Originally posted by CX
Which part are you referring to here Gemwolf? The only mention of TV that i can see here was in my original post, and as i said this was a documentary about hackers, not fiction from a movie.
Apologies if you were referring to some other part of this thread.
Originally posted by CX
... my original question, is wireless computing a lot more vunerable than the normal sytems? Is it worth purchasing?
Thanks,
Originally posted by johnsky
Originally posted by apc
1. SSID : DONT BROADCAST THIS!!!
don't bother. You can still see the radio, it just wont show a name. A few minutes with an air sniffer will reveal it.
[edit on 11-5-2006 by apc]
That is assuming someone is already communicating to that node while youre sniffing.
Also, something I forgot. Most wireless routers allow you to specify certain mac addresses that can connect to the node. If you tell it to permit only one mac address, and set that mac address to one machine... then the hacker would have to spoof their mac address before trying to connect to the network.
Originally posted by Gemwolf
Originally posted by CX
Which part are you referring to here Gemwolf? The only mention of TV that i can see here was in my original post, and as i said this was a documentary about hackers, not fiction from a movie.
Apologies if you were referring to some other part of this thread.
No, I wasn't referring to you at all. Just some other people's ideas about hacking and computer security. I won't name them, just in order to keep the peace.
As for cracking WEP in minutes - what program? You still have to get ~500k packets to get a good crack on basic WEP with Aircrack FMS attacks. Are you talking about using injection programs to create those packets? I need to set that up in the lab and try it, shame I haven't done that yet.
Originally posted by apc
high bitrate WEP encryption coupled with IPSec, static routes and mac address tables, and redundant authentication (passwords) for resources. Makes it bulletproof within reason.