Hacking For Beginners – Manthan Desai
2010
Countermeasures for Wireless attacks
Hide the Wireless Network:
Do not broadcast the SSID of the Wireless Network. This will help you in protecting yourWireless being invisible to the people who do not know about Passive War Driving
Use a Secured Key :
You can use the WEP Key protection on your Wireless Network to protect your WirelessNetwork Connection.
Although this is not the ultimate security measure but will help you a lot against the ScriptKiddies who do not know how to break into the WEP Protection.
WPA: Wi-Fi Protected Access
• WPA employs the Temporal Key Integrity Protocol (TKIP) — which is a safer RC4 implementation — for data encryptionand either WPA Personal or WPA Enterprise for authentication.
• WPA Enterprise is a more secure robust security option but relies on the creation and more complex setup of a RADIUSserver. TKIP rotates the data encryption key to prevent the vulnerabilities of WEP and, consequently, cracking attacks.
Mac Filtering
An early security solution in WLAN technology used MAC address filters: A network administrator entered a list of validMAC addresses for the systems allowed to associate with the Wireless Access Point.
Choosing the Best Key
Always use a long WPA Key with lower as well as upper case letters including numbers and special characters.
Sample Key: 12345@abcde&FGHI
www.hackingtech.co.tv
Page 71