You are not logged in.
What can I do to a fresh Arch install for maximum security? I want to use a mail-client (I'm not sure which one yet) and I also ssh into a machine with sensitive data, and I have a wireless only connection.
What apps should I install/configure to stop someone from using my wireless connection against me?
Offline
On your wireless router you can enable WEP and WPA, but those are both very easy to break into. Your best bet is to no use wireless when you need security. If I'm wrong, someone correct me, but I know with 2 laptops and 2 wireless cards you can pretty much get into all the wireless Ive tried. You can also only allow connections from certain MAC Address', but again, those are easy to spoof.
Offline
Show me a link proving that WPA can be cracked, assuming the password isn't as pathetic as e.g. "fred" (i.e. simple dictionary attack) ![]()
Last edited by brebs (2008-04-28 17:22:01)
Improve your desktop responsiveness and font rendering and ALSA sound and BusyBox init
Offline
WPA was created as response for WEP being broken in 3 minutes
But it is very secure protocol unless key is long and hard enough (and you don't stick it to you screen
). I also haven't heard about cracked WPA.
Offline
I'm using WPA and MAC-based access control with my network and I've never had any issues. This area is so saturated with wireless networks (college town) that people would probably attack one of the other networks (many not encrypted at all) than try to brake into my network.
Offline
Cool. I use WPA anyway, but I didn't realize is was so uncrackable. I can sleep at night now. ![]()
Offline
of course WPA can be cracked enough publications about this can be found on the net, reason why was moved to WPA2 and eventually to WPA2-RADIUS.
Caused by weakness of pre-shared key.
in contrast to WEP, attacks against WPA with pre-shared key do not require a large amount of collected packets. You can perform it being in the range of AP.
Succesful attack against WPA-PSK requires capturing the four-way EAPOL handshake.
Simply wait for legitimate EAPL handshake to be transmitted and capture it run offline dictionary attack. Anything below 21 characters can be cracked in reasonable time.
WPA2-RADIUS has no known vulnerabilities.
Last edited by broch (2008-05-05 13:27:38)
Offline