Don keeballs paranoia site® | home
Tech tips
This part of our web site is for sharing our little secrets we have learned.
We will update this periodically with new things we come across and of course your submissions too.
********************************************************************************************************************************************************************
WIRELESS NETWORK TIPS
Change the default name of your Service Set identifier (SSID) and then turn off your SSID broadcast.
Enable WEP (wired equivalent protocol), and change the WEP keys dont leave the default ones.
change the log in user name and password on your router.
Use MAC filtering. Every network card has a unique MAC address and you can set your router up to let ONLY your cards have access.
Take the insulation out of the walls in your house and replace it with those copper Chor-Boy scrubbing pads to make your house Impenetraby radio waves... Oh and remember your tin foil hat.
Also if you have not yet purchased any of your wireless setup, I would suggest looking into D-Links enhanced line of wireless routers and cards
for two reasons. First they have a proprietary chipset instead of the usual Prism or Lucent chipset. The Texas Instruments chipset allows for what D-Link calls
4-X mode. Is it 4 times faster? No, however in 4-X mode it renders the D-Link devises incompatible with cards from other vendors. Most "war drivers" and software designed for wireless access point sniffing rely on the Lucent chipset. So even if they find your network they probably do not have the right kind of card to get on it.
Second reason is that the enhanced D-Link routers and cards support up to 256 bit encryption (128 bit is the highest most vendors offer). Probably the most used programs for WEP encryption cracking are Air snort and WEP-Crack . These programs work by collecting encrypted packets and breaking the encryption on them after a substantial amount of data is collected. It can take up to a Gig or more data to be collected and then crunched in a long painstaking attempt to break 128 bit encryption. Not only would 256 require alot more data to be collected it would be VERY time consuming and from my experience with Air snort it does not even support breaking 256 bit encryption.
*********************************************************************************************************************************************************************
If you have a tech tip and would like to see it on this site drop us an e-mail on our contact page.
|
||