![]() |
Wireless Guru? Prove it!
I'm setting up wireless networking in my house, and I'm pretty clueless to all this. Problem is that my Wireless Media Player for my HDTV only uses WEP protection.
Am I pretty safe using basic WEP 64 bits instead of WAP If I don't broadcast my SSID, and use the MAC Filter to only permit my computers and media player? Thanks in advance |
You need a flux capacitor.
|
Quote:
|
WEP isn't all that good. BUT, if you do close your network and run MAC only, the amount of trouble you'll have is minimal. Assuming of course that you keep an eye on things. I do the same and have 5-7 overlapping networks in my area, never had a problem.
|
<--- CISSP, MCSE
WEP is more then good enough when used with MAC filtering |
Quote:
|
Thanks toddler and pussyserver!
|
Only use WEP if you have no sensitive data going through the network. WEP can be broken within 10 minutes by someone who has the knowhow.
|
Quote:
|
thats bullshit the router will not even let the offending systen connect if its MAC is not in the allow table. And as far as breaking any type of crypto in 10 mins...... whatever stop making up stuff.
show me a white paper or at least proof on concept pussyservers.com calling people on bullshit since 2005 |
Quote:
How To Crack WEP ? Part 1: Setup & Network Recon http://tomsnetworking.com/Sections-article118.php How To Crack WEP - Part 2: Performing the Crack http://tomsnetworking.com/Sections-article120.php How To Crack WEP ? Part 3: Securing your WLAN http://www.tomsnetworking.com/Sections-article124.php Wireless LAN MAC Spoofing http://home.jwu.edu/jwright/papers/wlan-mac-spoof.pdf Why don't you learn when you are talking shit about something you don't understand damn n00b. :1orglaugh |
Quote:
|
Quote:
:1orglaugh :1orglaugh |
Quote:
2) 10 minutes is possible if the network is heavily utilized and they're only using 64 bits. Make it a couple hours if the network isn't highly utilized or they're using more bits in the key. 3) It's passive, a "connection" isn't necessary. Of course, after you've broken the WEP, you can certainlly find out the allowed MAC addresses, spoof one, and get a connection if you want to do more than just sniff out the target's passwords and the like. 4) Know WTF you're talking about before calling bullshit. |
still bullshit and I know for a fact its bullshit from war driving and doing shit my self not just reading what some script kiddie wrote for hi l33t hax0r crewand if you can break 64 bit crypto in 10 mins you should be working for the CIA instead of posting bullshit
|
yeah right a four part paper that requires two computers and a shitload of tools all done in in minutes
i want some of what ya smokin |
tat2jr my original answer still stands you are pretty safe.if someone is that determined to get in your system nothin can stop them
|
Best answer is to move to a place where people dont know what computers are. Thats what I did.
|
I use Mac filtering and its good
|
that pussyserver dude bothers me.
|
hacked xbox with xbox media center is the way to go... does 1080i and everything, loveeeeee it :)
|
Fuck it.... I'll stick to WAP for my wireless, and just wire my Media Player.... I've already got the cable there.... just was getting fancy since I was setting up my wireless router.
|
Quote:
flux-capacitors with tri-lithium crystals |
Quote:
:pimp |
WEP takes days,even weeks to crack if you only have a couple of computers running on the network. That is a more comfortable risk compared to WPA, which, while more secure, is still vulnerable to offline dictionairy attacks. Just make sure the clock tower is rigged perfectly before you try to warp.
|
Quote:
See the links I posted above, you use 2 computers, one to send data to the network, the other to crack the encryption. This is how it can be done in 10 minutes instead of weeks. |
| All times are GMT -7. The time now is 01:13 AM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123