Please register to participate in our discussions with 2 million other members - it's free and quick! Some forums can only be seen by registered members. After you create your account, you'll be able to customize options and access all our 15,000 new posts/day with fewer ads.
Seem to be a disparity here If 12 hours is laughably easy, what would you consider really hard? Or were you only thinking of WEP for your first statement?
12 hours is no time at all for brute forcing. It's extremely easy, you click a button and let your PC crunch passwords for several hours. Granted it's a little more eloquent than just guessing passwords nowadays. It would have taken days with older methods.
Why would I have been thinking about WEP? WEP is like trying to break through a wet paper towel.
I'm sure it can be broken after awhile, but why would anyone put in the effort? There are plenty of places to find where people have no password at all.
I'm sure it can be broken after awhile, but why would anyone put in the effort? There are plenty of places to find where people have no password at all.
Exactly.
If the data buzzing around on your network is worth that much effort to get to, then you won't be running wifi.
I'm sure it can be broken after awhile, but why would anyone put in the effort? There are plenty of places to find where people have no password at all.
Which is why I said this:
Quote:
Originally Posted by kazyn
------------------------
Overall, it all really depends on who's attacking you. If someone REALLY wants into your network, they will get in, regardless of your encryption or safeguards like mac filtering.
However, the chances that you'll be targeted by someone like this is extremely slim. They usually go for more low-hanging fruit....there are TONS of people out there who leave their connections wide open.
Standard procedure is to throw WPA or WPA2 on (AES is more secure than TKIP), turn off SSID broadcasting and change the admin username and password from defaults.
Yes, but you have to know the MAC addresses which are allowed to be used.
It's as simple as capturing one frame, for every frame contains both source and destination MAC addresses, in the clear even if encryption is being used.
Location: Mableton, GA USA (NW Atlanta suburb, 4 miles OTP)
11,334 posts, read 26,086,242 times
Reputation: 3995
Quote:
Originally Posted by Asheville Native
It's as simple as capturing one frame, for every frame contains both source and destination MAC addresses, in the clear even if encryption is being used.
Hmmm. Well, that's not fair.
Please register to post and access all features of our very popular forum. It is free and quick. Over $68,000 in prizes has already been given out to active posters on our forum. Additional giveaways are planned.
Detailed information about all U.S. cities, counties, and zip codes on our site: City-data.com.