reply to post by dfens
Lord knows what an ISP can do in two 5 minute spans.
Lol, we're not talking 1950s wire taps here friend. If the isp decided to monitor him (because of posts on ats? lol that's rich) they surely
wouldn't disconnect him. In fact, most things the isp would do are completely transparent to the user.
anyways, from someone with a bit of wifi intrusion experience (both sides) here's some advice:
WPA 2 minimum, nothing below, wep is like writing your password beside your computer. WPA 2 with a long, unique, salted pass phrase. Salted meaning
alternate characters (@!*) and no terms in a dictionary, no curse words or common terms. Using a weak password with hacker or txt type isn't gonna
cut it either.
Wifi hacking isn't actually hard, here's my example (this is for WEP and to a lesser extent WPA).
Basic HP laptop,
cisco wifi card (anything with Atheros chipset will do)
Backtrack linux
Step 1. Find the network. Using various tools I look at all incoming traffic, turning off SSID broadcast doesn't stop me from seeing you.
Step 2. Find a client on that network and spoof the client (software that changes the MAC hardware address of the wifi card to match that of the
legit client)
Step 3. Forge packets from the client to the AP asking for a connection reset. (the legit user shouldn't even notice this, but if it works, the
client machine reconnects and authenticates to the server)
Step 4. Capture the authentication handshake from the client to the AP
Step 5. Now that we have a handshake file, we can start working. If the AP has a default SSID it's even easier as there are hash tables already
provided.
Now this is where it gets in depth even for me, but basically what is going on is I'm using precompiled tables of SSIDs and passwords, running them
against the handshake hash. I then specify a dictionary, basically a file full of words and potential passwords.
With WEP, it's only a matter of time as you get basically everything you need.
With WPA and WPA2 it's a crap shoot, you aren't cracking anything, you are merely bruteforcing the password against the authentication handshake.
It's as if you sat at the password screen trying every possible combination.
If the term is in your dictionary, it will eventually decrypt it. If not, a true brute force could take years, or seconds, you never really know.
So in short, always use WPA 2 with a COMPLEX password, as no hacker is going to waste more than 5 minutes trying to crack into your network without a
reason.
As well, when you buy a router, or get one assigned from the ISP, I suggest you make the following security changes:
Disable the admin page for the router over WiFi (I can't tell you how many routers I've reset out of the kindness of my heart)
change the admin user and password, leaving admin as a guest with no access or blocked completely
Change the IP (if you can) of the management interface.
the more road blocks you put up the better. MAC based filtering helps, but again, the first step in cracking is spoofing a MAC so it's not fool
proof.
and the best advice is get to know your router logs, and the devices on your network, so you can easily spot things that shouldn't be there.