Fun with new shiny from work :)
Dec. 8th, 2005 07:23 pmWork have just given me one of these, except with 1GB RAM and an internal DVD writer too. VMWare is coming as well. Muahahaha!
I've just arrived at
kissycat1000's and decided to see if there were any wireless networks floating around. Yup. 2. Both unsecured. One wouldn't give me an IP address, but the other one would. I promptly downloaded nmap for windows and had a quick scan. Well whaddaya know. Their wireless router homepage is available to me, not password protected. I can restore factory defaults or restart the router. I could even change the settings to lock to just this laptop, then put a password on and restart it.. *evil cackle*
People do do the dumbest things with networking equipment ;)
I might scan it every now and again to see if there's another PC on there, then try to send them a message or leave them a file letting them know their network is insecure ;)
I've just arrived at
People do do the dumbest things with networking equipment ;)
I might scan it every now and again to see if there's another PC on there, then try to send them a message or leave them a file letting them know their network is insecure ;)
no subject
Date: 2005-12-08 07:38 pm (UTC)no subject
Date: 2005-12-08 07:52 pm (UTC)no subject
Date: 2005-12-08 08:25 pm (UTC)no subject
Date: 2005-12-08 08:26 pm (UTC)no subject
Date: 2005-12-08 08:30 pm (UTC)no subject
Date: 2005-12-08 10:20 pm (UTC)That is something I've just done - I'm right now writing up the joys of getting WPA2 wireless networking configured with Windows XP. One of the real fun bits about wireless networking is the rather large number of standards you've got within the 802.11 area. There is a, b, g and n for the actual transmittion of the data and then fun things like i for the enhanced security stuff. The different 802.11 standards currently go from a to w!
When it comes to wireless networking, the security you can use are as follows:
Strangely enough this is the least secure - anyone who can see the network can connect to it. This is probably the level of security on the wireless networks you're connecting to
Only slightly better than nothing at all, but not that useful as AirSnort and similar can easily get the SSID
Slightly more useful as only permitted machines are allowed to connect. That said, AirSnort et al can see the ethernet addresses used and its easy enough to forge packets to get around MAC filtering
Amusingly enough WEP was throughly broken back in 2001 and at best its only really useful to stop random people connecting to your network and shouldn't be used for anything critical. You have a network key - effectively a shared password - which can be 56, 128 or 156 bits in length. If you don't know the WEP key then you will not be able to connect to the network.
Uses better encryption than WEP and has better protection for keys; this is really the lowest level of wireless security you should consider for any traffic you care about
Second version of WPA which implements the 802.11i security standard. Definately the one to use as it uses AES for its encryption rather than RC4 and is in general considered to be pretty secure
There are two sub-standards for both WPA and WPA2; the standard WPA/WPA2 requires for there to be an 802.1X authentication server available - generally this is a RADIUS server - which is a little bit of an overkill for SOHO or personal usage. To get around this there is now WPA-PSK and WPA2-PSK which uses a known secret in a similar way to a WEP key. The difference is that it uses the much stronger authentication and encryption of WPA/WPA2. You do need to use a far longer password than the usual 6-8 characters people use for passwords.
Work now have two wireless LANs in operation; one has its SSID broadcast and only has WEP protecting it. However that network is totally untrusted; people on it are trusted less than people on the general internet and they are extremely limited in how they connect to the net. The other has a hidden SSID - mainly due to limitations in the APs I'm using - and uses WPA2. Users individually authenticate against a RADIUS server so I can lock access right down. As a result this network is directly connected to the internal network as, in a way, access to it is better controlled than if the users plugged their laptop into the wired network!
no subject
Date: 2005-12-08 10:22 pm (UTC)I've also heard of some APs (NetGear being one AFAIR) which you tell to only allow management access on the wired network and which then ignore this. I've also heard of APs which allow management features to completely bypass any firewalls which are in place on the built-in router.
no subject
Date: 2005-12-08 11:12 pm (UTC)Btw, regarding spotting wifi networks - Recommended handy proggie: NetStumbler. Free, and great for spotting info about networks. Then apply your favorite WEP cracker on most networks, and jump in.
Not that I condone such things, naturally. It's purely acedemic... ;)
no subject
Date: 2005-12-08 11:36 pm (UTC)Yes I'm going to have to learn and perhaps play with AirSnort et al a bit on these home networks :)
no subject
Date: 2005-12-08 11:37 pm (UTC)no subject
Date: 2005-12-09 09:27 am (UTC)TBH its the only sensible way of doing things when its said and done. After all there is the need to support random people coming in the building who could have any sort of machine in any sort of state and also the need to support staff as well. The first set need the absolute basics as you can't guarentee that they'll have the latest stuff to run in a more secure mode - hell Windows only supported plain WPA in service pack 2 of WinXP! Thus the use of a WEP key and nothing more. However as a result of using that the network shouldn't be trusted.
Thus the second, more secure, staff network is used where you can dictate what people use to connect to it.
I tried using the VPN from the unsecured network but that had been blocked - apparently people can do all sorts of nasty things if it's not, but it wasn't explained to me
Er, I think someone doesn't entirely know what they are doing then. When it really comes down to it, there is little difference between someone using the wireless network to connect to the VPN and someone coming in from the Internet to do the same. In some respects its better as you can actually see what the other people are doing.
It could be the case that the VPN system your work is using can't be configured to provide VPN access on the interface the open wireless network is on - it all depends on what you're using as a VPN system.
no subject
Date: 2005-12-09 11:36 am (UTC)And no, I don't know the ins and outs of our VPN, but it's a PPTP connection. I know, it didn't make much sense to me either.
no subject
Date: 2005-12-09 11:51 am (UTC)LEAP only came about as a band-aid to WEP; its now been replaced by the 802.11i standard which implements WPA2.
A PPTP-based VPN connection is normally associated with Windows VPN servers; its kind of amusing to note the first sentance of the Wikipedia PPTP entry - "PPTP is broken and it should not be used where password privacy or data security is important"!
no subject
Date: 2005-12-09 12:23 pm (UTC)Our password policy is pretty strict though, so at best it might take the attacker a while to crack it with a diverse dictionary.
Oh, and I think the kit was using PEAP, the next evolution of LEAP. That sounds right.
I've downloaded
asleapand I'm going to capture my login and see what happens.no subject
Date: 2005-12-09 12:39 pm (UTC)Er... sort of. PEAP stands for Protected Extensible Authentication Protocol and is a general authentication mechanism generally used for both wireless and 802.1X AAA. Its not really the next evolution of LEAP when it comes down to it. The first PEAP system - EAP-TLS - was in place before the PEAP became an open standard.
no subject
Date: 2005-12-09 04:46 pm (UTC)VMWare is pretty good, only crashed on me once so far, I haven't resolved all problems I have with it yet though.