17-04-2006, 20:48
|
#8
|
cf.mega poster
Join Date: Mar 2006
Location: Oslo, Norway.
Age: 36
Services: Canal Digital: 50/10
Posts: 7,577
|
Re: Securing my network
Quote:
Originally Posted by Gareth
Sorry, didn't mean to worry anyone  If you're interested in learning more about this, I would strongly recommend downloading a copy of BackTrack ( www.remote-exploit.org) and reading up about the various tools found in the Wireless section of BackTrack. Briefly, to exploit a WLAN using MAC filtering, you'd sit and catch packets being broadcast legitimatly between the AP and the clients, and once you'd determined that a MAC address had been successfully authenticated with the AP, you'd change the MAC of your wireless card to spoof the one you grabbed. Using something such as wellenreiter and either ethereal or tcpdump, or kismet, or netstumbler, etc... this kinda thing is pretty trivial. It's also possible to set up a laptop with a wireless card to pretend to be a wireless AP, at which point any PCs with a wireless card will try connecting to it to get the details, which is another way of obtaining MAC addresses, amongst other things. However, just to put this into perspective, chances are people who know how to do this are not going to go to the effort just to access your home WLAN - this is mostly reserved for corporate WLAN access. So, don't have nightmares... sleep tight 
|
Haha, nice ending.
I get how this works, and yeah, i think i can put up with kicking someone off my network if they tried so hard to get in.. haha.
|
|
|