|
|
|
||||
|
Welcome to the GoFuckYourself.com - Adult Webmaster Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content and access many other special features. Registration is fast, simple and absolutely free so please, join our community today! If you have any problems with the registration process or your account login, please contact us. |
![]() |
|
|||||||
| Discuss what's fucking going on, and which programs are best and worst. One-time "program" announcements from "established" webmasters are allowed. |
|
|
Thread Tools |
|
|
#1 |
|
Confirmed User
Join Date: Feb 2001
Location: Sunny California
Posts: 4,882
|
Wireless Guru? Prove it!
I'm setting up wireless networking in my house, and I'm pretty clueless to all this. Problem is that my Wireless Media Player for my HDTV only uses WEP protection.
Am I pretty safe using basic WEP 64 bits instead of WAP If I don't broadcast my SSID, and use the MAC Filter to only permit my computers and media player? Thanks in advance
__________________
NICHE MONEY >> Ass Worship • Panties • Solo Teen • Pantyhose Serving up exclusive fetish sites since 1997! |
|
|
|
|
|
#2 |
|
Registered User
Industry Role:
Join Date: Jul 2003
Location: Encrypted. Access denied.
Posts: 31,779
|
You need a flux capacitor.
|
|
|
|
|
|
#3 | |
|
Junior Achiever
Industry Role:
Join Date: Nov 2004
Location: Walled Garden
Posts: 17,066
|
Quote:
|
|
|
|
|
|
|
#4 |
|
Confirmed User
Join Date: Jun 2002
Location: austin, tx
Posts: 1,911
|
WEP isn't all that good. BUT, if you do close your network and run MAC only, the amount of trouble you'll have is minimal. Assuming of course that you keep an eye on things. I do the same and have 5-7 overlapping networks in my area, never had a problem.
__________________
http://www.flickr.com/photos/zoddler/ |
|
|
|
|
|
#5 |
|
So Fucking Banned
Join Date: Oct 2005
Location: I convert perverts like catholic church!
Posts: 5,133
|
<--- CISSP, MCSE
WEP is more then good enough when used with MAC filtering |
|
|
|
|
|
#6 | |
|
Registered User
Industry Role:
Join Date: Jul 2003
Location: Encrypted. Access denied.
Posts: 31,779
|
Quote:
|
|
|
|
|
|
|
#7 |
|
Confirmed User
Join Date: Feb 2001
Location: Sunny California
Posts: 4,882
|
Thanks toddler and pussyserver!
__________________
NICHE MONEY >> Ass Worship • Panties • Solo Teen • Pantyhose Serving up exclusive fetish sites since 1997! |
|
|
|
|
|
#8 |
|
Confirmed User
Join Date: Dec 2004
Location: the center
Posts: 1,454
|
Only use WEP if you have no sensitive data going through the network. WEP can be broken within 10 minutes by someone who has the knowhow.
|
|
|
|
|
|
#9 | |
|
Confirmed User
Join Date: Feb 2001
Location: Sunny California
Posts: 4,882
|
Quote:
__________________
NICHE MONEY >> Ass Worship • Panties • Solo Teen • Pantyhose Serving up exclusive fetish sites since 1997! |
|
|
|
|
|
|
#10 |
|
So Fucking Banned
Join Date: Oct 2005
Location: I convert perverts like catholic church!
Posts: 5,133
|
thats bullshit the router will not even let the offending systen connect if its MAC is not in the allow table. And as far as breaking any type of crypto in 10 mins...... whatever stop making up stuff.
show me a white paper or at least proof on concept pussyservers.com calling people on bullshit since 2005 |
|
|
|
|
|
#11 | |
|
Confirmed User
Join Date: Dec 2004
Location: the center
Posts: 1,454
|
Quote:
How To Crack WEP ? Part 1: Setup & Network Recon http://tomsnetworking.com/Sections-article118.php How To Crack WEP - Part 2: Performing the Crack http://tomsnetworking.com/Sections-article120.php How To Crack WEP ? Part 3: Securing your WLAN http://www.tomsnetworking.com/Sections-article124.php Wireless LAN MAC Spoofing http://home.jwu.edu/jwright/papers/wlan-mac-spoof.pdf Why don't you learn when you are talking shit about something you don't understand damn n00b. ![]() |
|
|
|
|
|
|
#12 | |
|
Confirmed User
Join Date: Dec 2004
Location: the center
Posts: 1,454
|
Quote:
|
|
|
|
|
|
|
#13 | |
|
Ronin
Join Date: May 2004
Location: Live by the code Die by the code
Posts: 17,693
|
Quote:
![]()
__________________
![]() NichePay - $30 on all trials - Killer Ratios .................................................. Female Ejaculation - Hairy - Shemale Puffy Nipples - Huge Clits - And More! .................................................. |
|
|
|
|
|
|
#14 | |
|
Registered User
Join Date: Jul 2005
Location: VA, USA
Posts: 87
|
Quote:
2) 10 minutes is possible if the network is heavily utilized and they're only using 64 bits. Make it a couple hours if the network isn't highly utilized or they're using more bits in the key. 3) It's passive, a "connection" isn't necessary. Of course, after you've broken the WEP, you can certainlly find out the allowed MAC addresses, spoof one, and get a connection if you want to do more than just sniff out the target's passwords and the like. 4) Know WTF you're talking about before calling bullshit. |
|
|
|
|
|
|
#15 |
|
So Fucking Banned
Join Date: Oct 2005
Location: I convert perverts like catholic church!
Posts: 5,133
|
still bullshit and I know for a fact its bullshit from war driving and doing shit my self not just reading what some script kiddie wrote for hi l33t hax0r crewand if you can break 64 bit crypto in 10 mins you should be working for the CIA instead of posting bullshit
|
|
|
|
|
|
#16 |
|
So Fucking Banned
Join Date: Oct 2005
Location: I convert perverts like catholic church!
Posts: 5,133
|
yeah right a four part paper that requires two computers and a shitload of tools all done in in minutes
i want some of what ya smokin |
|
|
|
|
|
#17 |
|
So Fucking Banned
Join Date: Oct 2005
Location: I convert perverts like catholic church!
Posts: 5,133
|
tat2jr my original answer still stands you are pretty safe.if someone is that determined to get in your system nothin can stop them
|
|
|
|
|
|
#18 |
|
Too lazy to set a custom title
Industry Role:
Join Date: Mar 2003
Location: Homeless
Posts: 62,911
|
Best answer is to move to a place where people dont know what computers are. Thats what I did.
__________________
PornGuy skype me pornguy_epic AmateurDough The Hottes Shemales online! TChicks.com | Angeles Cid | Mariana Cordoba | MAILERS WELCOME! |
|
|
|
|
|
#19 |
|
Confirmed User
Industry Role:
Join Date: Oct 2001
Location: Montreal
Posts: 3,989
|
I use Mac filtering and its good
__________________
free sex videos |
|
|
|
|
|
#20 |
|
Guest
Posts: n/a
|
that pussyserver dude bothers me.
|
|
|
|
#21 |
|
Confirmed User
Join Date: May 2004
Location: ...
Posts: 761
|
hacked xbox with xbox media center is the way to go... does 1080i and everything, loveeeeee it
__________________
Programmer ICQ 44035273 | AIM spritwork | Email spritian at spritian dot com |
|
|
|
|
|
#22 |
|
Confirmed User
Join Date: Feb 2001
Location: Sunny California
Posts: 4,882
|
Fuck it.... I'll stick to WAP for my wireless, and just wire my Media Player.... I've already got the cable there.... just was getting fancy since I was setting up my wireless router.
__________________
NICHE MONEY >> Ass Worship • Panties • Solo Teen • Pantyhose Serving up exclusive fetish sites since 1997! |
|
|
|
|
|
#23 | |
|
Confirmed User
Join Date: May 2003
Posts: 564
|
Quote:
flux-capacitors with tri-lithium crystals
__________________
http://www.silvercash.com/ |
|
|
|
|
|
|
#24 | |
|
Confirmed User
Join Date: Dec 2004
Location: the center
Posts: 1,454
|
Quote:
![]() |
|
|
|
|
|
|
#25 |
|
Confirmed User
Join Date: Sep 2005
Posts: 481
|
WEP takes days,even weeks to crack if you only have a couple of computers running on the network. That is a more comfortable risk compared to WPA, which, while more secure, is still vulnerable to offline dictionairy attacks. Just make sure the clock tower is rigged perfectly before you try to warp.
|
|
|
|
|
|
#26 | |
|
Confirmed User
Join Date: Dec 2004
Location: the center
Posts: 1,454
|
Quote:
See the links I posted above, you use 2 computers, one to send data to the network, the other to crack the encryption. This is how it can be done in 10 minutes instead of weeks. |
|
|
|
|