It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by Frater210
reply to post by brill
Brill,
I really appreciate you bringing this to our attention. But it leaves me wondering about the 10 hour thing. In order for a person to dedicate 10 hours to brute forcing someones WPA they would have to be real interested in whatever they wanted in that person's network. I understand that whatever is on the machine might be irrelevant to the break in and that the point might be to own the box for other purposes, but 10 hours?
Originally posted by HoldTheBeans
reply to post by brill
It doesn't take ten hours to hack your wifi no matter what security you have is somebody wants in. Hell you can find the info on google if you really want to. Sony can get whatever they want off your PC and the courts say it's fine to begin with. Don't keep anything on your PC you don't want somebody to see if your so worried. Buy you a stand alone drive and plop it there or any other number of media you could store it on.
Originally posted by Frater210
I really appreciate you bringing this to our attention. But it leaves me wondering about the 10 hour thing. In order for a person to dedicate 10 hours to brute forcing someones WPA they would have to be real interested in whatever they wanted in that person's network. I understand that whatever is on the machine might be irrelevant to the break in and that the point might be to own the box for other purposes, but 10 hours?
Originally posted by GunzCoty
10 hours? i did it in 15 mins using backtrack to hack mine. And lets face it Wi-Fi is not really secure at all.
And to think of all the people i see in coffee shops with there laptops open typing away without thinking about the security or lack there of. Hacking a "hot spot" is easier then hacking the laptops using it. Think about that next time your out and about. Be smart be safe.edit on 12/29/2011 by GunzCoty because:
Originally posted by ludshed
It can take a lot more or less than 10 hours depending on several variables. Linux back track is a pretty handy platform for testing. But 2 big factors would be the complexity of the passphrase and whats under the hood of the offensive machine. Porting to cuda can speed up the time greatly but can still take days if there is a very complex phrase and there have to be clients attached to begin with. I tell all my customers security is an illusion, it doesn't matter if its a machine/network, a house or a country. The best we can do is make it as hard as possible, case in point, longest passphrase possible mixed with upper and lowercase letters, numbers and symbols. Turn off your "broadcast SSID" and then name it something like "dial up", deploy your mac filter, lower the strength of your radio to only what you need to get to the furthest point you use it. And if possible mount it on the floor of your basement so what signal is being output is shielded by the earth and goes up instead of out in all direction. Also have machines shut down when not in use and change passphrase frequently. Also you can see if your devices are 802.1x compliant and deploy.
As you've indicated its not about getting to your data but owning you. Identity theft is rampant and this merely presents another node to use for whatever reasons the perpetrator sees fit. Because this particular method is relatively new the time factor will drop with more effective code. This has the potential to be where WEP was several years back.
brill
Originally posted by Frater210
reply to post by Pixiefyre
No, I know, you are totally correct, push button and return later. I know. The OP is totally correct as well. There should be a post about this every day. What the hell are we going to do about this? Can't someone create some kind of "kaleidoscopic key generator" or something? I know we will solve it, but considering that all the security options offered by the routers sent to most folks by their ISPs are now moot, what is the next best go to?
I was thinking it would be a Freedombox type setup up (linked in my post above) which seems to function as a secure proxy through which all household traffic is filtered. What do you think? Have I got that straight?
Originally posted by benrl
I would be more concerned with people using your internet for illegal purposes, you could park in a development with a uttility van and farm access to large groups of secured internet...
Say for a denial of service attack on someone, than whoops your IP was used in a terrorist attack...
Just saying.
OR
How about loading up someones computer with Illegal documents, depending on how your network sharing is set up you could put anything on that computer and make it look like the computer in the house was the origin of the information on its drives...
Could be useful to frame people and or get revenge, just trying to think outside the box with what this info could be used for.edit on 29-12-2011 by benrl because: (no reason given)