View Single Post
Old 17-04-2006, 20:28   #7
Gareth
cf.mega poster
 
Gareth's Avatar
 
Join Date: Dec 2003
Age: 50
Posts: 7,101
Gareth has a pair of shiny starsGareth has a pair of shiny starsGareth has a pair of shiny starsGareth has a pair of shiny starsGareth has a pair of shiny starsGareth has a pair of shiny stars
Gareth has a pair of shiny starsGareth has a pair of shiny starsGareth has a pair of shiny starsGareth has a pair of shiny starsGareth has a pair of shiny starsGareth has a pair of shiny starsGareth has a pair of shiny stars
Re: Securing my network

Quote:
Originally Posted by Druchii
Quote:
You could also restrict the MAC addresses allowed to connect to your router, so that only those that you know and have specified, can successfully connect. However, this is not a foolproof method - it can be easily bypassed.
After hearin that i want to know how ? I have my router set up like this and am now sort of worried.
Sorry, didn't mean to worry anyone

If you're interested in learning more about this, I would strongly recommend downloading a copy of BackTrack (www.remote-exploit.org) and reading up about the various tools found in the Wireless section of BackTrack.

Briefly, to exploit a WLAN using MAC filtering, you'd sit and catch packets being broadcast legitimatly between the AP and the clients, and once you'd determined that a MAC address had been successfully authenticated with the AP, you'd change the MAC of your wireless card to spoof the one you grabbed. Using something such as wellenreiter and either ethereal or tcpdump, or kismet, or netstumbler, etc... this kinda thing is pretty trivial.

It's also possible to set up a laptop with a wireless card to pretend to be a wireless AP, at which point any PCs with a wireless card will try connecting to it to get the details, which is another way of obtaining MAC addresses, amongst other things.

However, just to put this into perspective, chances are people who know how to do this are not going to go to the effort just to access your home WLAN - this is mostly reserved for corporate WLAN access. So, don't have nightmares... sleep tight
Gareth is offline   Reply With Quote