Tilted Forum Project Discussion Community  

Go Back   Tilted Forum Project Discussion Community > Interests > Tilted Technology


 
 
LinkBack Thread Tools
Old 08-23-2004, 08:05 PM   #1 (permalink)
Upright
 
Location: Katy, TX
Wireless internet question.

Hi, I just got a wireless router, which transmits my cable connection wirelessly, I also have a reciever(adapter) or whatever you want to call it, which takes that internet connection. So basically now I can have internet on my laptop without any wires. What I don't know is how to set password or some form of protection so that only my particular laptop can get that wireless internet, and not anyone else.
Thank you.
__________________
Things you own, end up owning you.
Manorotsky is offline  
Old 08-23-2004, 08:30 PM   #2 (permalink)
Crazy
 
Ok depending on the type of router you have you need to find out where you have to set a WEP Key. After you set the WEP key only the computers using that key as a password will be allowed access to your network.

SO what model router do you have?
iamii is offline  
Old 08-23-2004, 08:42 PM   #3 (permalink)
Tilted F*ckhead
 
Church's Avatar
 
Location: New Jersey
And make sure its a good password. My password is 154 characters long.
__________________
Through counter-intelligence, it should be possible to pinpoint potential trouble makers, and neutralize them.
Church is offline  
Old 08-23-2004, 08:46 PM   #4 (permalink)
Tilted Cat Head
 
Cynthetiq's Avatar
 
Administrator
Location: Manhattan, NY
Quote:
Originally Posted by Church
And make sure its a good password. My password is 154 characters long.
a bit overkill especially if you MAC filter out your router to accept only thos MAC addresses you specify...

of course...Tiki Tiki Tembo No Sa rembo Cherri Berry Ruchi Pip Berry Pembo is a good password
__________________
I don't care if you are black, white, purple, green, Chinese, Japanese, Korean, hippie, cop, bum, admin, user, English, Irish, French, Catholic, Protestant, Jewish, Buddhist, Muslim, indian, cowboy, tall, short, fat, skinny, emo, punk, mod, rocker, straight, gay, lesbian, jock, nerd, geek, Democrat, Republican, Libertarian, Independent, driver, pedestrian, or bicyclist, either you're an asshole or you're not.
Cynthetiq is offline  
Old 08-23-2004, 08:46 PM   #5 (permalink)
Upright
 
Location: Katy, TX
Yes I found the encryption key, if thats what WEP is. I set the character and all. btw what is WEP.

ps. thanks for responses.
__________________
Things you own, end up owning you.
Manorotsky is offline  
Old 08-23-2004, 08:51 PM   #6 (permalink)
Tilted F*ckhead
 
Church's Avatar
 
Location: New Jersey
Quote:
Originally Posted by Cynthetiq
a bit overkill especially if you MAC filter out your router to accept only thos MAC addresses you specify...

of course...Tiki Tiki Tembo No Sa rembo Cherri Berry Ruchi Pip Berry Pembo is a good password
replace the spaces in there with different numbers and you'd have a great password.
__________________
Through counter-intelligence, it should be possible to pinpoint potential trouble makers, and neutralize them.
Church is offline  
Old 08-23-2004, 08:55 PM   #7 (permalink)
Junkie
 
zero2's Avatar
 
Change the default SSID name
Disable SSID Broadcasting
Enable Mac Filtering -->Start--->Run--->cmd--->ipconfig /all
Select to filter either by, a class devices, b class devices, or g class devices, depending on what you have.
Use WEP Encryption, remember to choose a strong password, that isn't found in the dictionary. Use both letters and numbers when coming up with a password.
zero2 is offline  
Old 08-23-2004, 09:40 PM   #8 (permalink)
Upright
 
Location: Katy, TX
Thanks zero, although i don't get the mac filtering stuff. The main router is connected to windows ME and the reciever is XP.
__________________
Things you own, end up owning you.
Manorotsky is offline  
Old 08-24-2004, 12:16 PM   #9 (permalink)
Xepidemic
Guest
 
another tip, go to the farthest point in your house away from the router and then check what speed your connection speed is.
now for example, if your connection speed was 6mb turn off all the lower speeds from 5mb-1mb. This way you can only connect at 6mb and up and far away jackers wont be able to get on your network.

and another tip. just turn off your router when your not using it.
 
Old 08-24-2004, 03:32 PM   #10 (permalink)
Junkie
 
This topic comes up again and again. I have posted regularly on this. I work specificially in the wireless networking industry, so let me offer you some advice.

Carry out the following steps...

1 - Enable WPA if at all possible
Background
WPA (WiFi Protected Access) greatly increases WLAN security. It introduces several new enhancements, including TKIP (Temporal Key Integrity Protocol) that mitigates against so-called AirSnort or Wardriving attacks, and MIC (Message Integrity Check) that protects against Man in the Middle attacks. It also increases the WEP Initialization Vector from 24bits to 48bits, which is a huge improvement, as this makes the statistical likelihood of a weak IV being captured much lower. Finally, WPA introduces a dynamic key management feature, which allows for regular and automatic regeneration of WEP keys.
Implementation
WPA for most home wireless kit will run in WPA-PSK mode. The PSK stands for Pre Shared Key. This is effectively a password that you enter in your Access Point and your client that is used to independently generate new WEP keys on a regular basis. Ensure your passphrase is at least 20 characters long!
Caveats
Not all Access Points support WPA. This is unfortunate, but is not the end of the world. See below...



2 - Change default SSID
Background
SSID (Service Set Identifier) can be considered analogous to a network name. All Access Points come "out of the box" with a default SSID. Every hacker worth his salt will know the most common SSIDs. Common examples are "Linksys" (for Linksys kit), "Netgear" (for Netgear kit), "Tsunami" (for Cisco kit) etc.
Implementation
Change the SSID to something more appropriate to you. Your name, favourite band, pet... whatever. Just don't use the default.
Caveats
None. There is no reason this should not be done.



3 - Disable SSID Broadcast
Background
SSID (Service Set Identifier) can be considered analogous to a network name. Most Access Points "broadcast" this by default. That is, they advertise the SSID to any listening client devices. This is fine for enterprise networks or "hotspots", but there is no reason to advertise your network to your neighbours. You will know the SSID anyway (see above), so you don't need to broadcast it.
Implementation
Different for all manufactures, but it should be pretty obvious. Just look for "SSID Broadcast" and disable it.
Caveats
This should not be considered a security improvement, as it's still possible to ascertain the SSID of a network that is not broadcasting, but it IS best practice. Just do it.



4 - Enable MAC filtering
Background
All Ethernet devices, including WLAN interfaces, have a MAC address. This is a 6-byte hexadecimal address that a manufacturer assigns to the Ethernet controller for a port. MAC addresses are "lower level" that IP addresses and are used on the Data layer. You can setup your Access Point to only allow certain MAC addresses (ie, certain devices) use your WLAN. In other words, you configure it to only allow your computer (laptop, sister/brother's etc) to associate to the WLAN. This will prevent unwanted visitors from hitching a free ride...
Implementation
Search for MAC Filter in your Access Point config guide. You will have to go to each computer you will use on your WLAN and note down their MAC address. Make sure you note down the WIRELESS adaptor, and not the wired network card! It's a bit tedious (as a MAC address is a long sting of hex), but it's worth it.
Caveats
Not entirely foolproof, as experienced hackers can spoof MAC addresses. But it certainly adds greatly to security.



5 - Turn down transmit power
Background
Most Access Points can transmit at up to 100mW; some even more. Why bother covering more area that you need? There's no point is offering temptation to the people across the street, so you should turn down your transmit power to the lowest level that sufficiently covers your house/apartment.
Implementation
Different for every manufacturer. Check your user guide.
Caveats
You may need some tweaking to get it right. If you do, then congratulations. You just carried out what is called a "Site Survey" in the industry. Soon, you'll be doing this for a living!


6 - Change the admin password
Background
All Access Points come with an Admin account and password. You would be surprised at how many people leave these as the default ("Admin" and "Admin" for Linksys kit for example). You should change the password to something only you know as soon as you can.
Implementation
There shouldn't be any problem doing this. Just look for the Admin or Account Management section on your configuration page.
Caveats
Make sure you note down what you change the Admin password to!!



What happens if my Access Point doesn't support WPA?!!!
Well, you can still follow steps 2 to 6 above. But you will have to manually setup a WEP key on your Access Point and your client devices. This is a pain, but ABSOLUTELY NECESSARY. You should also change this regularly; at least once every few months.





Any more questions, feel free to ask.


Mr Mephisto

Last edited by Mephisto2; 08-24-2004 at 07:03 PM.. Reason: Formating
Mephisto2 is offline  
Old 08-24-2004, 05:00 PM   #11 (permalink)
beauty in the breakdown
 
Location: Chapel Hill, NC
Man, I bet Mephisto has that on cut-and-paste. Every time a wireless discussion comes up, in goes Mephisto
__________________
"Good people do not need laws to tell them to act responsibly, while bad people will find a way around the laws."
--Plato
sailor is offline  
Old 08-24-2004, 05:27 PM   #12 (permalink)
Upright
 
Location: Katy, TX
Thanks a lot Mr Mephisto for that detailed answer . Really apprecate it.
__________________
Things you own, end up owning you.
Manorotsky is offline  
Old 08-24-2004, 07:01 PM   #13 (permalink)
Junkie
 
Quote:
Originally Posted by sailor
Man, I bet Mephisto has that on cut-and-paste. Every time a wireless discussion comes up, in goes Mephisto
Unfortunately not! LOL

I spent 30 mins typing that up (5 mins typing, 25 formating)

But nice idea. I'm going to save a copy this time...


Mr Mephisto
Mephisto2 is offline  
Old 08-24-2004, 07:27 PM   #14 (permalink)
Junkie
 
Quote:
Originally Posted by Manorotsky
Yes I found the encryption key, if thats what WEP is. I set the character and all. btw what is WEP.

ps. thanks for responses.

WEP stands for Wired Equivalent Privacy and was the original encryption technique defined in the 802.11 standards. It was supposed to offer good security but has proven to be fundamentally flawed.

Initially, only 40bit keys were required, but that has since risen to 128bit.

However, based upon the fact that WEP relies on RC4 (not the strongest encryption standard), and uses 24bit IV (Initialization Vectors) to generate the WEP key itself, a good hacker can "listen in" and when they have captured enough packets can decode your WEP key. In other words, they can break your encryption.

This is often called the Airsnort attack, after the first popular tool designed to exploit it, but it was originally described as the Fluhrer style attack, after one of the authors who wrote a white-paper describing the vulnerability. Some people also call this WarDriving (or WarWalking). However, WarDriving is simply the process of driving around with a laptop and a wireless NIC, trying to find wireless networks. You would be appalled at how many are not secured properly and the WarDriver simply has to associate to get access to the network. That is what WarDriving is, not the specific cracking of the WEP encryption.

As a matter of historical (and geeky) interest, the term WarDriving is an evolution of the older hacker term WarDialing. WarDialing is the process of setting up a modem to systematically dial phone numbers, on the off chance you will eventually get a modem to respond. In the old days, most modems were simply configured to accept an incoming call and if you were lucky enough hit upon a number with a modem attached, more times than not you got inside that computer system. Remember, this is back in the 80's when most large computer systems still used modems for Sys Admins to do remote management, or even send email etc.

This is the way the hacker got into the Pentagon in the movie "War Games". Remember that movie?

Well, WarGames.... WarDialing... WarDriving.... get it?

Basically, the process is the same. Keep searching until you find an unsecured entry point and bingo... you're in.


Now, back to WEP.


The big problem with WEP used to be the fact that if a hacker collected enough packets, they could break your encryption. Originally the only way to address this was with enterprise class authentication protocols (based on something called EAP, or Extensible Authentication Protocol) that dynamically assigned a different WEP key to the user each time they logged on. When they logged on the next day, or when they roamed from Access Point to Access Point (remember large companies are generally going to have several APs on a floor), they would get a new WEP key. You could even configure the system to automatically create a new WEP key every few minutes, even if the user didn't roam. The most famous and popular EAP mechanism that provided dynamic key management (as it was called) was and still is Cisco LEAP.

By changing the WEP key every few minutes, every time the user logged on, and every time the user moved around the building, it made it very difficult for the hacker to collect enough packets using the same WEP key to successfully crack it.

But home users were still left in the dark. The only way they could avoid this kind of attack was to manually change the WEP key as often as possible. This is a pain, but you must remember that 90%+ of wireless hacking attacks are "opportunistic"; in other words they are WarDriving attacks. If someone has to dick around capturing packets and trying to decode WEP keys, they will probably move on to somewhere less secure. But dedicated or geeky hackers do exist and they do use Airsnort. That' why it's a good idea to change your WEP key as regularly as possible.

The good news is that WPA does all this automatically for you in the background. It effectively uses a different WEP key for every single packet. In other words, no way a hacker can decrypt your WEP key in a WPA environment.

It also allows you to setup a "timer" that means both the Access Point and the client regularly agree a brand new WEP key on a regular basis. This is handled by entering what's called a shared secret (or sometimes passphrase) on both devices. When the timer runs out, they both run the passphrase through an encryption algorithm and come up with a new WEP key independently. But because they both have the same passphrase, the new WEP key is identical for the Access Point and the client. Voila! You have a new WEP key and you never transmitted it over the air.

The problem lies with the length of the passphrase. Originally the specification called for a 20 character passphrase, but the equipment manufactures whined that this was too long for their dumb customers. The standard was revised to allow for passphrases of 8 characters minimum, instead of 20. The real problem is that with a short passphrase, you can actually be more vulnerable to attack!!! In other words, if you use WPA, make sure your passphrase is at least 20 characters long. It's worth it.


So, in summary


WEP = bad, old, vulnerable.
WPA = good, new(ish), secure if you use long passphrases
802.11i = excellent, new, rock solid Pentagon class security
WPA2 = same as 802.11i, just a different name


I haven't touched on 802.11i or WPA2 (or RSN, Robust Security Network) standards here, as they are mostly enterprise class solutions, but if anyone is interested please just ask.



Mr Mephisto
Mephisto2 is offline  
Old 08-24-2004, 09:44 PM   #15 (permalink)
Bim
Crazy
 
Bim's Avatar
 
Location: Onett, EagleLand
Some ones snooping in my network!

I got a problem i just noticed today. There is someone i dont know in my netowrk! I want him out of there. I have a wireless network in my house. 2 out of three comps are wireless. I saw this program the other day on the screen savers that monitors people using your connection. And you can allow or kick people using it.

I normaly keep my firewall down for sharing with my household. So I know the risk in that. I want this guy off my computer. So if anyone knows of such programs for monitoring your network easily. Or if theres a way to kick him out. Witch im pretty sure there is. please help. I fear for my computers safety.
__________________
"If you stay here too long, you'll end up frying your brain. Yes, you will. No, you will...not. Yesno, you will won't." -Guy in Moonside
Bim is offline  
Old 08-24-2004, 09:58 PM   #16 (permalink)
Junkie
 
Starman, are you saying someone is associating with, and using your home wireless network?

Or has someone planted a Trojan on your actual PC and is snooping that?

I just posted a number of lengthy posts on how to secure your wlan. Check them out...

Mr Mephisto
Mephisto2 is offline  
Old 08-24-2004, 11:57 PM   #17 (permalink)
Bim
Crazy
 
Bim's Avatar
 
Location: Onett, EagleLand
Cool, thanks for the info, i didnt see the thread before.

The guy is using our connection. I see his sharefolder, and some items. There are no viruses I did a scan for those. I just noticed him today so i dont know how long hes been there.

So basicaly to keep safe i enable WEP, and make my SSID invisable? I read the above, but i get kinda confused with this network thing.
Another thing too. Do i need to do all this from the computer that has the router is at it. I have 3 networked. And its a linksys system if that helps any. I'll read the above again... thanks for the info.
__________________
"If you stay here too long, you'll end up frying your brain. Yes, you will. No, you will...not. Yesno, you will won't." -Guy in Moonside
Bim is offline  
Old 08-25-2004, 05:34 AM   #18 (permalink)
Junkie
 
Tell me what Linksys device you have and I should be able to give you step by step instructions.

Mr Mephisto
Mephisto2 is offline  
Old 08-25-2004, 11:23 AM   #19 (permalink)
Bim
Crazy
 
Bim's Avatar
 
Location: Onett, EagleLand
Linksys Wireless - G <---Link

And Wireles - G PCI Adapters <--- Link

I figured it just eaiser to link you to its product page. I didn't know what to tell you from the box. Thanks for this help.
__________________
"If you stay here too long, you'll end up frying your brain. Yes, you will. No, you will...not. Yesno, you will won't." -Guy in Moonside

Last edited by Starman Deluxe; 09-19-2004 at 11:54 AM..
Bim is offline  
Old 08-27-2004, 01:05 AM   #20 (permalink)
Bim
Crazy
 
Bim's Avatar
 
Location: Onett, EagleLand
/bumpty Bump
__________________
"If you stay here too long, you'll end up frying your brain. Yes, you will. No, you will...not. Yesno, you will won't." -Guy in Moonside
Bim is offline  
Old 09-19-2004, 11:54 AM   #21 (permalink)
Bim
Crazy
 
Bim's Avatar
 
Location: Onett, EagleLand
Please help, he's still there.
/bump
__________________
"If you stay here too long, you'll end up frying your brain. Yes, you will. No, you will...not. Yesno, you will won't." -Guy in Moonside
Bim is offline  
Old 09-19-2004, 10:08 PM   #22 (permalink)
Junkie
 
OK Starman,

Do you need step by step instructions or can you follow the advice given above?

Configuring the Linksys box is pretty easy.


Mr Mephisto
Mephisto2 is offline  
Old 09-20-2004, 02:22 AM   #23 (permalink)
Bim
Crazy
 
Bim's Avatar
 
Location: Onett, EagleLand
Step by step if you don't mind. Computer Literacy isn't my strong point.
__________________
"If you stay here too long, you'll end up frying your brain. Yes, you will. No, you will...not. Yesno, you will won't." -Guy in Moonside
Bim is offline  
Old 09-20-2004, 09:49 PM   #24 (permalink)
Junkie
 
OK, well I'm heading off to San Fran on business for two weeks, so I won't be able to get to this before then.

Have you downloaded the manual off the CD and read it? Linksys documentation tends to be very good. It gives good instructions on how to configure all these options.

Basically you need to logon to the access point using Internet Browser (or equivalent).

You simply type the IP address into the internet address bar. So, where you normally type "www.tfproject.org" into IE to come here, type the IP address. The default IP address is 192.168.1.1

This might be different if someone has configured the router, but it sounds like you've never logged onto it before.

The default userID and password for Linksys devices is "admin" for userID and "admin" for password (don't enter the quote marks).

that will bring you to the Main Screen.


Let me know if that helps so far. If not, you'll have to wait until I come back!


Mr Mephisto
Mephisto2 is offline  
 

Tags
internet, question, wireless


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On



All times are GMT -8. The time now is 02:35 PM.

Tilted Forum Project

Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2024, vBulletin Solutions, Inc.
Search Engine Optimization by vBSEO 3.6.0 PL2
© 2002-2012 Tilted Forum Project

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360