lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
From: patrick.doyle at (Patrick Doyle)
Subject: Wireless Security

It's an interesting topic, thanks to all your replies.

Have a good weekend


-----Original Message-----
From: Jonathan A. Zdziarski []
Sent: 28 November 2003 16:46
Cc: Simon Hailstone; Patrick Doyle;
Subject: Re: [Full-Disclosure] Wireless Security

> You should be aware that MAC addresses can be forged as well.

I believe this also works (at least in Linux)

ifconfig wlan0 hw ether [new mac]

Tools like kismet make it all too easy to find a valid MAC address to
spoof on the network.

Application-Layer encryption is definitely the most secure method. 
EAP+Dynamic WEP keys is a significant enhancement, but still vulnerable
to session hijacking.  You may also consider using Token-based
authentication if you are going to run EAP (and to authenticate your
shells too).  RSA SecurID's ACE/Server will emulate a RADIUS server,
making it very useful for these types of authentication.  I'm sure
Cryptocard has something useful too.

What would be schweet is if you could use the SecurID token code (which
changes every 30 or 60 seconds) as a one-time pad for dynamic WEP key
changes.  Then you wouldn't have to pass WEP keys across the network
where they could be intercepted...and changing every 60 seconds would
make it virtually un-bruteable.

If you haven't read "Wireless Hacks" by O'Reilly yet, I strongly
recommend you grab a copy; it's an excellent little book.


BBCi at

This e-mail (and any attachments) is confidential and may contain personal views which are not the views of the BBC unless specifically
If you have received it in error, please delete it from your system. Do not use, copy or disclose the information in any way nor act in
reliance on it and notify the sender immediately. Please note that the BBC monitors e-mails sent or received.
Further communication will signify your consent to this.

Powered by blists - more mailing lists