[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[no subject]
- <!--x-content-type: text/plain -->
- <!--x-date: Sun Feb 29 18:01:52 2004 -->
- <!--x-from-r13: obo ng irelfrpheryvahk.pbz (Pbo Fbkra) -->
- <!--x-message-id: [email protected] -->
- <!--x-reference: [email protected] --> "http://www.w3.org/TR/html4/loose.dtd">
- <!--x-subject: [ale] Wireless access and WEP -->
- <li><em>date</em>: Sun Feb 29 18:01:52 2004</li>
- <li><em>from</em>: bob at verysecurelinux.com (Bob Toxen)</li>
- <li><em>in-reply-to</em>: <<a href="msg01122.html">[email protected]</a>></li>
- <li><em>references</em>: <<a href="msg01122.html">[email protected]</a>></li>
- <li><em>subject</em>: [ale] Wireless access and WEP</li>
The U.S. Federal Gov't's NIPC notes:
Successful exploitation of the vulnerability [in WEP] has been
simplified to getting within range to intercept the broadcast.
(Real World Linux Securty, Second Edition p153-155.)
> What is the best way to set up the system to provide the best possible
> security setup. If anyone has Netgear, I'd like to know how you have
> yours setup (WEP, limit by MAC address, etc.).
Limiting my MAC address also is almost worthless as WEP sends MAC addresses
in clear text. Thus, an attacker can take over an existing system's
MAC address and simply crash the legitimate system to get it out of
the way -- if it is Windows.
> Thanks.
Best regards,
Bob Toxen, CTO
Fly-By-Day Consulting, Inc.
"Your expert in Firewalls, Virus and Spam Filters, VPNs,
Network Monitoring, and Network Security consulting"
bob at verysecurelinux.com (e-mail)
My recent talks on Linux security include:
-> at Southeast Cybercrime Summit in Atlanta on Mar. 2-5 2004
-> at the FBI's Atlanta headquarters on Mar. 10 2004
at IBM's Linux Competency Center in New York City on Mar. 06 last year
at the Atlanta SecureWorld Expo in Atlanta on May 22 last year
at the Enterprise Linux Forum in Silicon Valley on June 04 last year
at Computer Associates' Atlanta Linux Security Summit on Sep. 16 last year
Author,
"Real World Linux Security: Intrusion Detection, Prevention, and Recovery"
2nd Ed., Prentice Hall, (C) 2003, 848 pages, ISBN: 0130464562
Also available in Japanese, Chinese, and Czech.
If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke
<a rel="nofollow" href="http://www.verysecurelinux.com">http://www.verysecurelinux.com</a> [Network & Linux/Unix Security Consulting]
<a rel="nofollow" href="http://www.realworldlinuxsecurity.com">http://www.realworldlinuxsecurity.com</a> [My 5* book: "Real World Linux Security"]
<a rel="nofollow" href="http://www.verysecurelinux.com/sunset.html">http://www.verysecurelinux.com/sunset.html</a> [Sunset Computer]
Quality Linux, UNIX and network security and software consulting since 1990.
</pre>
<!--X-Body-of-Message-End-->
<!--X-MsgBody-End-->
<!--X-Follow-Ups-->
<hr>
<!--X-Follow-Ups-End-->
<!--X-References-->
<ul><li><strong>References</strong>:
<ul>
<li><strong><a name="01122" href="msg01122.html">[ale] Wireless access and WEP</a></strong>
<ul><li><em>From:</em> trey at fastmail.fm (Trey Sizemore)</li></ul></li>
</ul></li></ul>
<!--X-References-End-->
<!--X-BotPNI-->
<ul>
<li>Prev by Date:
<strong><a href="msg01130.html">[ale] how to create user with no password</a></strong>
</li>
<li>Next by Date:
<strong><a href="msg01132.html">[ale] Software RAID Problems</a></strong>
</li>
<li>Previous by thread:
<strong><a href="msg01123.html">[ale] Wireless access and WEP</a></strong>
</li>
<li>Next by thread:
<strong><a href="msg01132.html">[ale] Software RAID Problems</a></strong>
</li>
<li>Index(es):
<ul>
<li><a href="maillist.html#01131"><strong>Date</strong></a></li>
<li><a href="threads.html#01131"><strong>Thread</strong></a></li>
</ul>
</li>
</ul>
<!--X-BotPNI-End-->
<!--X-User-Footer-->
<!--X-User-Footer-End-->
</body>
</html>