Page 2 of 2 FirstFirst 12
Results 41 to 46 of 46
  1. #41
    weightshead is offline Associate Member
    Join Date
    Jun 2004
    Posts
    270
    Quote Originally Posted by angelxterminator
    brute forcing a WAN would be a very long and tedious process. HAHAHA my neighbor next door happens to have a linksys wireless, and i have my WAN, but i have 512bit wep, his isn't even encrypted. lemme tell ya i've had some serious fun with his comp. Especially since he has a net server running IIS, the MOST insecure software microsoft has ever created
    this is precisely why people should at least use the highest WEP setting available to them, combined with proper MAC address filtering.

  2. #42
    max2extreme's Avatar
    max2extreme is offline Anabolic Member
    Join Date
    Aug 2004
    Posts
    0
    Just be patient though. If you dont have wireless and are thinking about it, I would wait. 802.11i is coming out soon. It uses what they call WPA, Wi-Fi Protected Access. Im not gonna get into it too deep, but WPA uses TKIP (Temporal Key Integrity Protocol) which changes the way keys are derived and rotates keys more often. Also adds a message integrity check to prevent packet forgeries. It also uses RSN, Robust Security Network which uses dynamic negotiation and encryption algorithms between access points and mobile devices. What all this means: Its uses way better security measures than WEP and requires you to use AES (Advanced Encryption Standard), which provides enough security to meet FIPS 140-2 specification which is required by many govt agencies.

  3. #43
    builtthekid's Avatar
    builtthekid is offline Banned
    Join Date
    Jun 2004
    Location
    Hitting bitches
    Posts
    768
    Umm **** Ive been working with computers all my life and I still dont know
    what the hell he was tallking about.

  4. #44
    max2extreme's Avatar
    max2extreme is offline Anabolic Member
    Join Date
    Aug 2004
    Posts
    0
    Sorry, Im in the computer intrusion/security field...Ill explain a little...TKIP is the next generation of WEP. Currently lets say you send 1000 packets. The encryption is going to be only 24 bit. AND every packet of that 1000 packets is going to have the same 24 bit encryption key. 802.11i uses AES which is up to 256 bit encryption. Not only that, but instead of having 1 256 bit key for all 1000 packets, EVERY packet will have a different 256 bit key. Understand?

    The message integrity check... lets say an attacker sends in false credentials to try gain access. Your computer sends back a msg "you dont have credentials" or what not..well the attacker can just write a 3 line perl code, attached to a packet send back and basically shuts down the system, giving him access. The MIC attaches a few bytes to each packet to make these packets tamper proof.

    In a robust security network, ALL IOS communcations and data transfers are ALWAYS encrypted. Not just messages and files, but all upward and downward system requests, status replies, and meta data.

    Hope this helps..sorry to talk above some people..

    -max

  5. #45
    CarbonCopy's Avatar
    CarbonCopy is offline Member
    Join Date
    Oct 2001
    Location
    USA
    Posts
    557
    Quote Originally Posted by max2extreme
    Sorry, Im in the computer intrusion/security field...Ill explain a little...TKIP is the next generation of WEP. Currently lets say you send 1000 packets. The encryption is going to be only 24 bit. AND every packet of that 1000 packets is going to have the same 24 bit encryption key. 802.11i uses AES which is up to 256 bit encryption. Not only that, but instead of having 1 256 bit key for all 1000 packets, EVERY packet will have a different 256 bit key. Understand?

    The message integrity check... lets say an attacker sends in false credentials to try gain access. Your computer sends back a msg "you dont have credentials" or what not..well the attacker can just write a 3 line perl code, attached to a packet send back and basically shuts down the system, giving him access. The MIC attaches a few bytes to each packet to make these packets tamper proof.

    In a robust security network, ALL IOS communcations and data transfers are ALWAYS encrypted. Not just messages and files, but all upward and downward system requests, status replies, and meta data.

    Hope this helps..sorry to talk above some people..

    -max

    Actually, WPA is a subset of 802.11i. And, I believe WPA will have backward compatibility with the older standards.

    Peace,

    CC
    Last edited by CarbonCopy; 08-25-2004 at 05:14 AM.

  6. #46
    max2extreme's Avatar
    max2extreme is offline Anabolic Member
    Join Date
    Aug 2004
    Posts
    0
    Yea you're right, 802.11i will be backward compatible with WPA, but the AES encryption option requires coprocessors that arent in most access points today.

    Later,

    -max

Page 2 of 2 FirstFirst 12

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •