Nova5
Well-Known Member
Thank you all - This is why I have a job.
In my workspace all wireless is banned for life, no transmitters at all, no flash drives etc. Same at home for me.
By the time they come out with a standard that uses encryption light enough for wireless, others have already come up with ways to crack it.
If you use wireless, use SSH2 and tunnel through it, and only allow your IP through, then monitor it. Any usage that is not you, "You've been hacked".
On a side note, with the big hole in DNS now, ensure any site you go to that has your personal info via certificates.
Man in the middle and misdirection are going to come back in a big way.
Take care all.
WPA is pretty much impenetrable for the most part. If use use a totally random jibberish password of the kind heKDT.XZZAJ*^$(85T56KNfd#LOHG%6U8iUY6R^75
Your connection won't be broken into without extremely long brute force attacks. Long enough you'd notice the gimp parked outside for weeks.
Anyhow, Secure your WPA system with RADIUS and they are going to have an even harder time getting in. I use a RADIUS system with certificate based security authentication. By the time they crack it, a few years at best, I'll have gone through a few more certificates. WPA is right now a very stout encryption method when backed with non-dictionary passwords or a RADIUS server.
WPA's first stage is in open unenrypted signal, but a temp key is used to secure it and sends the new encryption key in the encrypted channel. With certificates, no key is sent in the clear. a encrypted certificate is sent over the open channel. This when accepted encrypts the channel and begins rotating the security key every hour or whenever the user set it to.
Yea... good luck to anyone wanting access.