[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[no subject]



The U.S. Federal Gov't's NIPC notes:

     Successful exploitation of the vulnerability [in WEP] has been
     simplified to getting within range to intercept the broadcast.

(Real World Linux Securty, Second Edition p153-155.)

> What is the best way to set up the system to provide the best possible 
> security setup.  If anyone has Netgear, I'd like to know how you have 
> yours setup (WEP, limit by MAC address, etc.).
Limiting my MAC address also is almost worthless as WEP sends MAC addresses
in clear text.  Thus, an attacker can take over an existing system's
MAC address and simply crash the legitimate system to get it out of
the way -- if it is Windows.

> Thanks.

Best regards,

Bob Toxen, CTO
Fly-By-Day Consulting, Inc.
"Your expert in Firewalls, Virus and Spam Filters, VPNs,
Network Monitoring, and Network Security consulting"
bob at verysecurelinux.com (e-mail)

My recent talks on Linux security include:

-> at Southeast Cybercrime Summit in Atlanta             on Mar. 2-5 2004
-> at the FBI's Atlanta headquarters                     on Mar.  10 2004
   at IBM's Linux Competency Center in New York City     on Mar.  06 last year
   at the Atlanta SecureWorld Expo in Atlanta            on May   22 last year
   at the Enterprise Linux Forum in Silicon Valley       on June  04 last year
   at Computer Associates' Atlanta Linux Security Summit on Sep.  16 last year

Author,
"Real World Linux Security: Intrusion Detection, Prevention, and Recovery"
2nd Ed., Prentice Hall, (C) 2003, 848 pages, ISBN: 0130464562
Also available in Japanese, Chinese, and Czech.

If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke

<a  rel="nofollow" href="http://www.verysecurelinux.com";>http://www.verysecurelinux.com</a>       [Network &amp; Linux/Unix Security Consulting]
<a  rel="nofollow" href="http://www.realworldlinuxsecurity.com";>http://www.realworldlinuxsecurity.com</a> [My 5* book: &quot;Real World Linux Security&quot;]
<a  rel="nofollow" href="http://www.verysecurelinux.com/sunset.html";>http://www.verysecurelinux.com/sunset.html</a>                    [Sunset Computer]
Quality Linux, UNIX and network security and software consulting since 1990.


</pre>
<!--X-Body-of-Message-End-->
<!--X-MsgBody-End-->
<!--X-Follow-Ups-->
<hr>
<!--X-Follow-Ups-End-->
<!--X-References-->
<ul><li><strong>References</strong>:
<ul>
<li><strong><a name="01122" href="msg01122.html">[ale] Wireless access and WEP</a></strong>
<ul><li><em>From:</em> trey at fastmail.fm (Trey Sizemore)</li></ul></li>
</ul></li></ul>
<!--X-References-End-->
<!--X-BotPNI-->
<ul>
<li>Prev by Date:
<strong><a href="msg01130.html">[ale] how to create user with no password</a></strong>
</li>
<li>Next by Date:
<strong><a href="msg01132.html">[ale] Software RAID Problems</a></strong>
</li>
<li>Previous by thread:
<strong><a href="msg01123.html">[ale] Wireless access and WEP</a></strong>
</li>
<li>Next by thread:
<strong><a href="msg01132.html">[ale] Software RAID Problems</a></strong>
</li>
<li>Index(es):
<ul>
<li><a href="maillist.html#01131"><strong>Date</strong></a></li>
<li><a href="threads.html#01131"><strong>Thread</strong></a></li>
</ul>
</li>
</ul>

<!--X-BotPNI-End-->
<!--X-User-Footer-->
<!--X-User-Footer-End-->
</body>
</html>