Hacking For Beginners – Manthan Desai

2010

Countermeasures for Wireless attacks

Hide the Wireless Network:

Do not broadcast the SSID of the Wireless Network. This will help you in protecting yourWireless being invisible to the people who do not know about Passive War Driving

Use a Secured Key :

You can use the WEP Key protection on your Wireless Network to protect your WirelessNetwork Connection.

Although this is not the ultimate security measure but will help you a lot against the ScriptKiddies who do not know how to break into the WEP Protection.

WPA: Wi-Fi Protected Access

• WPA employs the Temporal Key Integrity Protocol (TKIP) — which is a safer RC4 implementation — for data encryptionand either WPA Personal or WPA Enterprise for authentication.

• WPA Enterprise is a more secure robust security option but relies on the creation and more complex setup of a RADIUSserver. TKIP rotates the data encryption key to prevent the vulnerabilities of WEP and, consequently, cracking attacks.

Mac Filtering

An early security solution in WLAN technology used MAC address filters: A network administrator entered a list of validMAC addresses for the systems allowed to associate with the Wireless Access Point.

Choosing the Best Key

Always use a long WPA Key with lower as well as upper case letters including numbers and special characters.

Sample Key: 12345@abcde&FGHI

www.hackingtech.co.tv

Page 71