Security Basics mailing list archives
RE: Wireless access
From: "Kelly Jones" <kellyjones () worldonline co uk>
Date: Fri, 26 Mar 2004 07:52:21 -0000
Most if not all wireless hardware allows you to accept or deny connections based on Mac address. It is easily possible to spoof a Mac address but you would obviously need to know which mac address to spoof. With the highest level of Wep enabled and a strong key this would be very difficult. Which wiresless router were you thinking of using? -----Original Message----- From: Paul John Summers [mailto:paul_john_summers () hotmail com] Sent: 25 March 2004 19:27 To: security-basics () securityfocus com Subject: RE: Wireless access And addendum to that question, do any wireless routers contain tools so that you can block all but specific hardware addresses? That is, my home wireless router would block all but my hardware address, much like hard-wired networks often require registration of hardware addresses before allowing a new system to access it. I do believe there are methods of spoofing hardware addresses but that aside, do wireless routers have capabilities for this sort of thing that a home user could easily administer to better secure their home network? Disclaimer: I'm also a newbie so please forgive any misconceptions or false assumptions! From: "Bruyere, Michel" <mbruyere () ezemcanada com> To: security-basics () securityfocus com Subject: Wireless access Date: Thu, 25 Mar 2004 08:36:05 -0500 Hi, I have a user who uses a wireless network at home. He just asked me (it's a director) to find a way to avoid his laptop (Toshiba tecra running XP Pro) connecting on the neighbor's router instead of his. He has a D-Link 614+, I don't know this model at all so I'm asking you guys if you know a way to restrict his laptop to only HIS router. As you can see, I'm not very familiar with Wireless :/ Thanks for any inputs M.Bruyere Network/systems administrator CompTIA A+, Network+ --------------------------------------------------------------------------- Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off any course! All of our class sizes are guaranteed to be 10 students or less to facilitate one-on-one interaction with one of our expert instructors. Attend a course taught by an expert instructor with years of in-the-field pen testing experience in our state of the art hacking lab. Master the skills of an Ethical Hacker to better assess the security of your organization. Visit us at: http://www.infosecinstitute.com/courses/ethical_hacking_training.html ---------------------------------------------------------------------------- _________________________________________________________________ Get rid of annoying pop-up ads with the new MSN Toolbar – FREE! http://toolbar.msn.com/go/onm00200414ave/direct/01/ --------------------------------------------------------------------------- Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off any course! All of our class sizes are guaranteed to be 10 students or less to facilitate one-on-one interaction with one of our expert instructors. Attend a course taught by an expert instructor with years of in-the-field pen testing experience in our state of the art hacking lab. Master the skills of an Ethical Hacker to better assess the security of your organization. Visit us at: http://www.infosecinstitute.com/courses/ethical_hacking_training.html ---------------------------------------------------------------------------- --- Incoming mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.634 / Virus Database: 406 - Release Date: 18/03/2004 --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.634 / Virus Database: 406 - Release Date: 18/03/2004 --------------------------------------------------------------------------- Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off any course! All of our class sizes are guaranteed to be 10 students or less to facilitate one-on-one interaction with one of our expert instructors. Attend a course taught by an expert instructor with years of in-the-field pen testing experience in our state of the art hacking lab. Master the skills of an Ethical Hacker to better assess the security of your organization. Visit us at: http://www.infosecinstitute.com/courses/ethical_hacking_training.html ----------------------------------------------------------------------------
Current thread:
- Wireless access Bruyere, Michel (Mar 25)
- Re: Wireless access Kenton Smith (Mar 25)
- <Possible follow-ups>
- RE: Wireless access CHRIS GRABENSTEIN (Mar 25)
- RE: Wireless access Wesley Ward (Mar 25)
- RE: Wireless access Paul John Summers (Mar 25)
- Re: Wireless access Kenton Smith (Mar 26)
- RE: Wireless access Kelly Jones (Mar 26)
- RE: Wireless access David Gillett (Mar 26)
- Re: Wireless access Ellis, Wong Chung Yee (Mar 26)
- RE: Wireless access Kirk.Brookover (Mar 26)
- RE: Wireless access Dante Mercurio (Mar 26)
- RE: Wireless access Peter Martin (Mar 26)
- RE: Wireless access Thomas F. Szabo (Mar 26)
- RE: Wireless access Jordan, Jason D. "Dallas" (Mar 26)
- RE: Wireless access Robert Mezzone (Mar 26)
- Re: Wireless access John S . Whitford (Mar 26)
- Re: Wireless access John S . Whitford (Mar 29)
(Thread continues...)