• Welcome to Overclockers Forums! Join us to reply in threads, receive reduced ads, and to customize your site experience!

Wireless 101:A Guide to Security

Overclockers is supported by our readers. When you click a link to make a purchase, we may earn a commission. Learn More.
Another good tip to router security is to change the router's IP. It might not keep all out, but at least it'll keep out those who know the famous 192.168.1.1 address that will bring up the login prompt for the admin password. Since most routers give out 100+ to users, change it to something like 2-99.

I do the above, have my SSID changed and admin password changed, and filter by mac address. I'm not worried about encryption due to the area I live in.
 
TalRW said:
Wi-Fi Protected Access Preshared Key (WPA-PSK) (Encryption)
...

Weaknesses: While the encryption itself is virtually uncrackable the pass key a user selects can be prone to dictionary attacks. Attackers could possibly capture packets with a packet sniffer and use brute force and dictionary attacks. To overcome use "strong" passwords consisting of random letters, numbers, and characters as well as long as possible (63 charchters maximum). Use cut and paste to put passwords into devices. Do not use phrases as this is easier to crack through brute force than random characters.
[/list]
Another weakness, is that your generally trusted, laptop-wielding brother/sister/cousin/mother/friend/roommate/etc. can - ignorantly or maliciously - give away the PSK. Or someone can look in his/her computer (or yours, for that matter) for it. Not that it's a huge issue anyway with MAC filtering and some paranoia, but I thought it would be worth mentioning.
 
Last edited:
Alpha_One said:
Another weakness, is that your generally trusted, laptop-wielding brother/sister/cousin/mother/friend/roommate/etc. can - ignorantly or maliciously - give away the PSK. Or someone can look in his/her computer (or yours, for that matter) for it. Not that it's a huge issue anyway with MAC filtering and some paranoia, but I thought it would be worth mentioning.

Physical access can defeat just about any security, so it's not the most valid criticism, although it is a very important point.

MAC filtering is a very weak security vs good encryption, so actually, that is a big deal. (Breaking the encryption brings you within one easy step of getting in. Breaking MAC filtering still leaves you with encryption.)

As far as I understand it, though, it would still take some great effort to extract the key from physical access to the computer, as they generally aren't stored in plain text. But again, once somebody has physical access, most security goes in the toilet.

A good way to store a key might be steganographically, where the information is hidden inside other data. :) -- Paul
 
Will something like WPA2 slow down your connection at all?
Ive just set up my wireless and i notice that pages take a little longer to load and i have about 10ping lower in some games, even when all of my other computers are turned off.
 
Wi-Fi Protected Access Enterprise (WPA2) (Encryption)
What it does: WPA2 is similar to WPA-PSK but is intended for corporate environments. WPA2 uses a server to authenticate each user so that each user has a individual WPA key.
Why use it: Not needed for most home users. A business would want to use this for two main reasons. Firstly if a business was using WPA every end user would have the same password and key and could then spy on other users on the network. Secondly ex-employees who knew the key could gain access to the network with standard WPA-PSK. With WPA2 you can simply remove the ex-employee from the authentication server.

WPA2 is WPA with AES encryption instead of TKIP (read: RC4 based) encryption. WPA-TKIP encryption is vulnerable to the same attacks that WEP is vulnerable to (weak initialization vectors), and adding AES fixed that. And actually on alot of equipment AES provides better performance than WEP or WPA-TKIP due to hardware encryption. So there is no reason not to use it.

I think steve gibson (or wherever you got your information from) got 802.11x and 802.11i mixed up, as 802.11x does what he is talking about, and WPA2 is a full implementation of 802.11i, whereas WPA is a partial implementation of the security standard.

See here: http://en.wikipedia.org/wiki/IEEE_802.11i
 
Note: If you want to use WPA2 then you're going to want this MS update: http://support.microsoft.com/kb/917021

Here's the screens for a WRT54G. I'm running third party firmware (highly recommended: http://www.thibor.co.uk/) so might screens might look a little different.

wrt54g1ka1.jpg

- Wireless Network Name (SSID): Use something original
- Wireless SSID Broadcast: "Disable"

wrt54g2ry3.jpg

- Security Mode: I'd recommend "WPA2 Personal"
- WPA Algorithms: I use "TKIP+AES", which allows legacy WPA-TKIP connections if the client doesn't support WPA2-AES.
- WPA Shared Key: Use something original, with both letters and numbers, and really long

wrt54g3li6.jpg

Here you can allow/block PCs according to their MAC addresses.

wrt54g4pq6.jpg

The only thing worth mentioning here is the transmit power - if you're using your laptop right beside you router (or access point) you could turn the power down to prevent others from picking up the signal.

wrt54g5rk2.jpg

Always make sure that both remote access and wireless access is turned off for the router (unless you really need it).

--------

Other:

Two kinds of WAP2:
WPA2-Personal uses AES
WPA2-Enterprise uses a RADIUS server
 
Here's the screens for setting up an intel wireless card:

Start off by adding a profile, which brings you to:
intelwrls1cl8.jpg

Profile Name: Can be anything, make it descriptive (Home network, etc...)
SSID: Whatever you put in your router

intelwrls2at4.jpg

Choose "Personal Security", unless you're running a RADUIS server.
Security Settings: Choose whatever you picked in your router. Because I picked TKIP+AES in the router setup I could use either but WPA2-AES is more secure
Password: Your (hopefully) big long complicated password you put in the router

And that's it.

After it connects the details page should show you:
intelwrls3vi3.jpg

We've connected using WPA2-Personal / AES-CCMP mode. :)
 
Silversinksam said:
I'll add a couple noteworthy tidbits of info:

Here's the Default Router Password Database

http://www.routerpasswords.com/


Second, with drive-by-pharming being possible, changing your router password is just one of those things that is on your must do list.


http://www.cbronline.com/article_news.asp?guid=B2D823D1-D77D-471F-96B2-0DED432A0CA2


This is awesome! I cannot tell you how often I have had to Google to find a default password after resetting some jackass's router back to defaults 'cause he pooched it up so bad.
 
I'm going to be getting my first router here pretty soon and after reading so much about them I realize that I have alot to learn. This thread helped tremendously to clarify some things for me so hopefully I'll get to put some of it to use when I setup my Belkin N1 Vision in a couple weeks.
 
Might be kinda overkill for home users, but you might also want to add information about RADIUS servers and the concepts of AAA.. Nearly unbreakable security for people who need it anyway, definately a point of interest for security nuts.
 
Broken links

All of these links are broken:

Additional Information:

* A Beginner's Guide To Securing a Wireless Network: A guide written by our own macklin01 while slightly out of date (written Sept. 03) it contains many useful bits of information as well as many tips for actually implementing the security methods discussed in this guide
* Kilian's Guide for Wireless Network Security in Windows XP A great guide for secure wireless networking.
* Wi-Fi Security: A guide from http://www.wi-fi.org that covers many of the security tools discussed above.
* WPA Password Generator: A password generator from Steve Gibson at www.grc.com that creates WPA passwords that will be immune to dictionary and brute force attacks. Just copy and paste the random key into a text document and repaste it into all of your wireless devices.
:bang head
 
Hmm, as for the password generator, pretty much any random string generator should suffice. I use the one in the Password Safe program, which is a great (encrypted) place to store that random WPA password. :)
 
SSID Hiding?
Boy that will stop hackers from redirecting your packets to another router and hijack/inject them with malware.

Any device contented to a hidden ssid can easy be redirected to another wifi network accesses point and whatnot.
Just saying...
 
Back