Related Posts Plugin for WordPress, Blogger...

WiFi security attacks

Posted by VdoCity Sunday, September 25, 2011, as I announced before I was going to write about soon wireless attacks, the series consists of three parts (may be more, depending on your comments) and will be covered by John Jeffrey. In the first part John explains the basics of wireless attacks and security. Before moving on to advanced things, like breaking the WEP and WPA, you need to have the basic idea of ​​how a wifi connection.

WiFi Wireless Fidelity means, its a device that performs the functions of a router, but also includes the functions of a wireless access point and network switch.
They are commonly used to allow access to the Internet or computer network without a wired connection. Wi-Fi is commonly used in airports, offices, etc.
How does the Wifi?

The work of connection is fairly simple to understand. The components of wireless network includes a communication device such as a laptop or a cell phone, etc postpone a router and Internet connection
The communication device has a wireless support (laptops) converts the data in the form of radio waves and transmits it to the router through an antenna. The router receives the signal and decodes it. The router sends the information to the Internet using a physical connection, Ethernet cable.

Reverse communication is the same (ie) the router receiving information, translate into a radio signal and sending it to the wireless adapter on your computer.

What is the danger?
Safety is an important part of a home wireless network. If you configure the router to create an open access point, anyone with a wireless card will be able to use his signal. And he / she will be able to use your Internet connection.

To protect and maintain our private Internet service can use one of the following encrypted

Wired Equivalent Privacy (WEP) is a weak security algorithm for wireless networks. His intention was to ensure data confidentiality comparable to that of a traditional wired network. WEP, recognizable by the key 10 or 26 hexadecimal digits, the widely used and is often the security option first introduced to the users by router configuration tools.
Although its name implies that it is as secure as a wired connection, WEP has been shown to have numerous defects and has been deprecated in favor of new standards such as WPA2.

WPA and WPA 2
WPA (Wi-Fi Protected Access) and WPA2 (Wi-Fi Protected Access II) are two security protocols for wireless networks Wi-Fi Alliance that was developed to provide a migration from WEP.
The Alliance defines these in response to the researchers had found serious deficiencies in the previous system, WEP

However, these ciphers can also be broken, the following demonstration shows how easy it is to crack WEP, WPA key

This young brain following demonstration shows how easy it is to break WEP, WPA key

How to protect your wireless network

1. Never use WEP encryption type, always use WPA or WPA 2, the type of encryption

2.Use passwords that can not be broken easily by using a dictionary attack or brute force attack

3. Always use a VPN when pubic use WiFi access points

We hope this information helps you out with doubts and clarifications please pass your comments


Post a Comment