![]() ![]() ![]() |
|
Jase2985:
read the manual?
have you touched it since you got it?
still not sure how this thread is still going
Yes I've made changes. Will look up manual.
Crowdie:
If you are really worried about your router security try the following:
1. Disable WPS. It takes on average 11,000 attempts to crack WPS. With modern laptops 11,000 attempts doesn't take long at all. WPS is a system that is up there with MAC address filtering on the "it sounded good at the time" scale.
2. Change your router admin password so it is 25+ characters long with small letters, capitals, numbers and special characters.
3. Ensure the wireless authentication is WPA2 AES. Telecom are shipping routers with a mixed mode (WPA TKIP and WPA2 AES) passphrase.
4. Change the wireless passphrase so it is 63 characters long (this is the longest currently supported) with small letters, capitals, numbers and special characters. IMPORTANT: Record the passphrase somewhere secure.
The easiest way to gain access to a residential wireless network is as follows:
- Deauthenticate a currently connected client (this is the only time you transmit) or wait until a client attempts to authenticate (no transmission required).
- Capture the four way handshake (this is where the router and the client work out if they both have the same key)
- Run the four way handshake capture through any number of offline applications that utilise dictionary files. If the wireless passphrase is in the dictionary file these applications will report it. If it is not then they won't.
How many of these dictionary files are likely to have all the possible 63 character passphrases made up of small letters, capitals, numbers and special characters?
Thanks, have done all of these.
|
![]() ![]() ![]() |