Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. Network security

Network security

Scheduled Pinned Locked Moved The Lounge
questioncomsysadminsecurity
13 Posts 10 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • J Offline
    J Offline
    Johnny
    wrote on last edited by
    #1

    I've got an XP laptop and a Mac all networked up together and sat behind a wireless router. Being particularly paranoid, I've tried my hardest to make sure that nothing is visible to the outside world. The router has it's firewall running, as does my XP and Mac. I've got the two computers sharing drives using SMB and, as far as I can tell, I've restricted this just to the computers in question. Naturally the wireless is running WPA. The reason for this post is to see if I can dive into the communal knowledge pool that is codeproject.com, and see if anyone has any gold nuggets of info that might make me feel safer. In particular, does anyone know of a tool I can run to get a list of all connected SMB clients? I was rather disturbed to find, when I looked in the DHCP list on my router, that some anonymous machine was also listed. I'm hoping it was just a stale entry from before I moved the wireless to WPA, but I want to make sure.

    S L C M N 7 Replies Last reply
    0
    • J Johnny

      I've got an XP laptop and a Mac all networked up together and sat behind a wireless router. Being particularly paranoid, I've tried my hardest to make sure that nothing is visible to the outside world. The router has it's firewall running, as does my XP and Mac. I've got the two computers sharing drives using SMB and, as far as I can tell, I've restricted this just to the computers in question. Naturally the wireless is running WPA. The reason for this post is to see if I can dive into the communal knowledge pool that is codeproject.com, and see if anyone has any gold nuggets of info that might make me feel safer. In particular, does anyone know of a tool I can run to get a list of all connected SMB clients? I was rather disturbed to find, when I looked in the DHCP list on my router, that some anonymous machine was also listed. I'm hoping it was just a stale entry from before I moved the wireless to WPA, but I want to make sure.

      S Offline
      S Offline
      Super Lloyd
      wrote on last edited by
      #2

      Disconnect from the internet and build a faraday cage around your office room. This way you will be almost secure! Install WebCam around your house and suspicious movment detector software to find out all FBI & KGB agent zeroing on you ...

      E 1 Reply Last reply
      0
      • J Johnny

        I've got an XP laptop and a Mac all networked up together and sat behind a wireless router. Being particularly paranoid, I've tried my hardest to make sure that nothing is visible to the outside world. The router has it's firewall running, as does my XP and Mac. I've got the two computers sharing drives using SMB and, as far as I can tell, I've restricted this just to the computers in question. Naturally the wireless is running WPA. The reason for this post is to see if I can dive into the communal knowledge pool that is codeproject.com, and see if anyone has any gold nuggets of info that might make me feel safer. In particular, does anyone know of a tool I can run to get a list of all connected SMB clients? I was rather disturbed to find, when I looked in the DHCP list on my router, that some anonymous machine was also listed. I'm hoping it was just a stale entry from before I moved the wireless to WPA, but I want to make sure.

        L Offline
        L Offline
        Lost User
        wrote on last edited by
        #3

        Most wireless routers allow you to restrict the MAC addresses which can connect to them. But, seriously, you have to consider the *wired* option, if you are very paranoid. If you are using WPA, it is difficult for others to get into your network or see packets.

        1 Reply Last reply
        0
        • J Johnny

          I've got an XP laptop and a Mac all networked up together and sat behind a wireless router. Being particularly paranoid, I've tried my hardest to make sure that nothing is visible to the outside world. The router has it's firewall running, as does my XP and Mac. I've got the two computers sharing drives using SMB and, as far as I can tell, I've restricted this just to the computers in question. Naturally the wireless is running WPA. The reason for this post is to see if I can dive into the communal knowledge pool that is codeproject.com, and see if anyone has any gold nuggets of info that might make me feel safer. In particular, does anyone know of a tool I can run to get a list of all connected SMB clients? I was rather disturbed to find, when I looked in the DHCP list on my router, that some anonymous machine was also listed. I'm hoping it was just a stale entry from before I moved the wireless to WPA, but I want to make sure.

          C Offline
          C Offline
          code frog 0
          wrote on last edited by
          #4

          When I have the time and want to do the stuff you are describing I go here: http://www.insecure.org[^] and I noodle around. You can find some pretty interesting stuff there and it's pretty cool. When I don't have the time and it's for a client I find a professional security auditor (aka hacker) and I let them do it. I have a few caveats for them and I want a full write-up. This path can be very interesting especially if you use two hacks and compare the results. - Rex


          If we all used the Plain English compiler every post in the lounge would be a programming question.:cool:
          Welcome to CP in your language. Post the unicode version in My CP Blog [ ^ ] now.

          People who don't understand how awesome Firefox is have never used CPhog[^]CPhog. The act of using CPhog (Firefox)[^] alone doesn't make Firefox cool. It opens your eyes to the possibilities and then you start looking for other things like CPhog (Firefox)[^] and your eyes are suddenly open to all sorts of useful things all through Firefox. - (Self Quote)

          1 Reply Last reply
          0
          • J Johnny

            I've got an XP laptop and a Mac all networked up together and sat behind a wireless router. Being particularly paranoid, I've tried my hardest to make sure that nothing is visible to the outside world. The router has it's firewall running, as does my XP and Mac. I've got the two computers sharing drives using SMB and, as far as I can tell, I've restricted this just to the computers in question. Naturally the wireless is running WPA. The reason for this post is to see if I can dive into the communal knowledge pool that is codeproject.com, and see if anyone has any gold nuggets of info that might make me feel safer. In particular, does anyone know of a tool I can run to get a list of all connected SMB clients? I was rather disturbed to find, when I looked in the DHCP list on my router, that some anonymous machine was also listed. I'm hoping it was just a stale entry from before I moved the wireless to WPA, but I want to make sure.

            L Offline
            L Offline
            Lost User
            wrote on last edited by
            #5

            G'Day Johnny, I'm far from an expert on this, but I have 2 suggestions for you.

            Johnny ² wrote:

            Naturally the wireless is running WPA.

            Does the router support WPA2? If so Windows XP at least supports it with this[^] update. I'm not sure about the Mac. I would recommend WPA2 over WPA anyday.

            Johnny ² wrote:

            I was rather disturbed to find, when I looked in the DHCP list on my router, that some anonymous machine was also listed.

            Your router should allow you lock DHCP access down to MAC addresses. Look into the setup in the router. Michael Martin Australia "I controlled my laughter and simple said "No,I am very busy,so I can't write any code for you". The moment they heard this all the smiling face turned into a sad looking face and one of them farted. So I had to leave the place as soon as possible." - Mr.Prakash 24/04/2004

            J 1 Reply Last reply
            0
            • S Super Lloyd

              Disconnect from the internet and build a faraday cage around your office room. This way you will be almost secure! Install WebCam around your house and suspicious movment detector software to find out all FBI & KGB agent zeroing on you ...

              E Offline
              E Offline
              Eytukan
              wrote on last edited by
              #6

              :laugh:


              --[V]--

              [My Current Status]

              1 Reply Last reply
              0
              • L Lost User

                G'Day Johnny, I'm far from an expert on this, but I have 2 suggestions for you.

                Johnny ² wrote:

                Naturally the wireless is running WPA.

                Does the router support WPA2? If so Windows XP at least supports it with this[^] update. I'm not sure about the Mac. I would recommend WPA2 over WPA anyday.

                Johnny ² wrote:

                I was rather disturbed to find, when I looked in the DHCP list on my router, that some anonymous machine was also listed.

                Your router should allow you lock DHCP access down to MAC addresses. Look into the setup in the router. Michael Martin Australia "I controlled my laughter and simple said "No,I am very busy,so I can't write any code for you". The moment they heard this all the smiling face turned into a sad looking face and one of them farted. So I had to leave the place as soon as possible." - Mr.Prakash 24/04/2004

                J Offline
                J Offline
                Johnny
                wrote on last edited by
                #7

                Michael Martin wrote:

                Does the router support WPA2? If so Windows XP at least supports it with this[^] update. I'm not sure about the Mac. I would recommend WPA2 over WPA anyday.

                Now that you mention it, it does. Once I've gotten through the Genuine Misadvantage check I'll give it a blast. Thanks!

                Michael Martin wrote:

                Your router should allow you lock DHCP access down to MAC addresses. Look into the setup in the router.

                I knew I'd regret buying a Chinese router... but I do think there is something that looks appropriate in the admin interface. I'll have to hope I don't ban my own address!

                P 1 Reply Last reply
                0
                • J Johnny

                  Michael Martin wrote:

                  Does the router support WPA2? If so Windows XP at least supports it with this[^] update. I'm not sure about the Mac. I would recommend WPA2 over WPA anyday.

                  Now that you mention it, it does. Once I've gotten through the Genuine Misadvantage check I'll give it a blast. Thanks!

                  Michael Martin wrote:

                  Your router should allow you lock DHCP access down to MAC addresses. Look into the setup in the router.

                  I knew I'd regret buying a Chinese router... but I do think there is something that looks appropriate in the admin interface. I'll have to hope I don't ban my own address!

                  P Offline
                  P Offline
                  Paul Conrad
                  wrote on last edited by
                  #8

                  Johnny ² wrote:

                  I knew I'd regret buying a Chinese router

                  Buy a Linksys router. I have my DHCP disabled, MAC addresses filtered to only allow my laptop, my wife's laptop, and the Nintendo DS. I've had no security issues :) Paul

                  1 Reply Last reply
                  0
                  • J Johnny

                    I've got an XP laptop and a Mac all networked up together and sat behind a wireless router. Being particularly paranoid, I've tried my hardest to make sure that nothing is visible to the outside world. The router has it's firewall running, as does my XP and Mac. I've got the two computers sharing drives using SMB and, as far as I can tell, I've restricted this just to the computers in question. Naturally the wireless is running WPA. The reason for this post is to see if I can dive into the communal knowledge pool that is codeproject.com, and see if anyone has any gold nuggets of info that might make me feel safer. In particular, does anyone know of a tool I can run to get a list of all connected SMB clients? I was rather disturbed to find, when I looked in the DHCP list on my router, that some anonymous machine was also listed. I'm hoping it was just a stale entry from before I moved the wireless to WPA, but I want to make sure.

                    M Offline
                    M Offline
                    Mike Dimmick
                    wrote on last edited by
                    #9

                    Toolwise the only one I'm aware of is Administrative Tools\Computer Management\Shared Folders\Sessions. Stability. What an interesting concept. -- Chris Maunder

                    1 Reply Last reply
                    0
                    • J Johnny

                      I've got an XP laptop and a Mac all networked up together and sat behind a wireless router. Being particularly paranoid, I've tried my hardest to make sure that nothing is visible to the outside world. The router has it's firewall running, as does my XP and Mac. I've got the two computers sharing drives using SMB and, as far as I can tell, I've restricted this just to the computers in question. Naturally the wireless is running WPA. The reason for this post is to see if I can dive into the communal knowledge pool that is codeproject.com, and see if anyone has any gold nuggets of info that might make me feel safer. In particular, does anyone know of a tool I can run to get a list of all connected SMB clients? I was rather disturbed to find, when I looked in the DHCP list on my router, that some anonymous machine was also listed. I'm hoping it was just a stale entry from before I moved the wireless to WPA, but I want to make sure.

                      N Offline
                      N Offline
                      NetSpinner
                      wrote on last edited by
                      #10

                      Finally a topic I can help out with! I do some wifi auditing at work, but most of my time on CP is spent lurking and learning from you code-masters. Some advice I have: -IMHO MAC filtering, disabling DHCP, and disabling the SSID are completely useless. When auditing wireless, I use kismet which will show me a network regardless of whether its broadcasting or not. If knowing the SSID is crucial, a simple void11 deauth will force the clients to restart the session at which time the SSID is temporarily exposed. Interestingly enough, the same void11 technique is used when spoofing MAC or IP addresses when I want to parade my laptop as an authorized machine. That being said, it doesn't hurt to do all of those things. After all, who's going to spend that kind of time getting into your network when there's a default 'linksys' broadcasting down the block? -As for encryption type...Well, everyone knows WEP can be cracked in under ten minutes (if there's enough authenticated traffic to generate the weak IVs). I've personally spent over 4 hours collecting enough from my home network...with only 2 wireless clients. WPA is the way to go and WPA2 is even better, but please make sure you don't use any dictionary based pass phrase. Compromising WPA requires a more elagant attack, but it can often work very quickly if a poor pass phrase is used. With some of the heuristic/brute crackers, I've successfully cracked pass phrases that are only partial words or even slang. For instance: < 67vette19 > was cracked in under 12 mins using the latest version of John and a 248 MB custom word list. Note my list contained the word "corvette" but not "vette." In a professional setting, no wireless is truly safe. I gotta agree with Lloyd; make yourself a closed network ;-) --Even RADIUS and some external auths can compromised, but at that level of security the easiest way in is most likely poor practices. The most difficult security I've ever been asked to bypass (in terms of wireless auditing, that is) would have to be a commercial firewall that runs the WLAN on a separate subnet as the LAN. The WLAN is WPA2 encrypted, and once authenticated there, the user must auth manually again via WIFIsec to an external RADIUS server. This essentially creates a VPN between the wireless users and the AP. With this technique, even an authenticated user cannot sniff other user's traffic because each user has their own private tunnel to the gateway. My 2 cents, -Jef chown -R us ./base -- modified at 9:19 Tuesday 30th May,

                      P 1 Reply Last reply
                      0
                      • N NetSpinner

                        Finally a topic I can help out with! I do some wifi auditing at work, but most of my time on CP is spent lurking and learning from you code-masters. Some advice I have: -IMHO MAC filtering, disabling DHCP, and disabling the SSID are completely useless. When auditing wireless, I use kismet which will show me a network regardless of whether its broadcasting or not. If knowing the SSID is crucial, a simple void11 deauth will force the clients to restart the session at which time the SSID is temporarily exposed. Interestingly enough, the same void11 technique is used when spoofing MAC or IP addresses when I want to parade my laptop as an authorized machine. That being said, it doesn't hurt to do all of those things. After all, who's going to spend that kind of time getting into your network when there's a default 'linksys' broadcasting down the block? -As for encryption type...Well, everyone knows WEP can be cracked in under ten minutes (if there's enough authenticated traffic to generate the weak IVs). I've personally spent over 4 hours collecting enough from my home network...with only 2 wireless clients. WPA is the way to go and WPA2 is even better, but please make sure you don't use any dictionary based pass phrase. Compromising WPA requires a more elagant attack, but it can often work very quickly if a poor pass phrase is used. With some of the heuristic/brute crackers, I've successfully cracked pass phrases that are only partial words or even slang. For instance: < 67vette19 > was cracked in under 12 mins using the latest version of John and a 248 MB custom word list. Note my list contained the word "corvette" but not "vette." In a professional setting, no wireless is truly safe. I gotta agree with Lloyd; make yourself a closed network ;-) --Even RADIUS and some external auths can compromised, but at that level of security the easiest way in is most likely poor practices. The most difficult security I've ever been asked to bypass (in terms of wireless auditing, that is) would have to be a commercial firewall that runs the WLAN on a separate subnet as the LAN. The WLAN is WPA2 encrypted, and once authenticated there, the user must auth manually again via WIFIsec to an external RADIUS server. This essentially creates a VPN between the wireless users and the AP. With this technique, even an authenticated user cannot sniff other user's traffic because each user has their own private tunnel to the gateway. My 2 cents, -Jef chown -R us ./base -- modified at 9:19 Tuesday 30th May,

                        P Offline
                        P Offline
                        Paul Conrad
                        wrote on last edited by
                        #11

                        NetSpinner, Thanks for the very informative post. Since I live in a rural area and am the only one on my block of 3 or 4 neighbors, anyone sitting in a car near my house with a laptop looking like they are war-driving is going to get my attention (least to say, my two dog's attention) pretty quick. PJC

                        J 1 Reply Last reply
                        0
                        • P Paul Conrad

                          NetSpinner, Thanks for the very informative post. Since I live in a rural area and am the only one on my block of 3 or 4 neighbors, anyone sitting in a car near my house with a laptop looking like they are war-driving is going to get my attention (least to say, my two dog's attention) pretty quick. PJC

                          J Offline
                          J Offline
                          JCParker
                          wrote on last edited by
                          #12

                          FYI - Radius from antenni for someone to get to your network can be roughly 2000'. If you use WEP crack with a P4 is under 10 minutes, collecting enough data under 30 minutes. WPA2 35 minutes collecting enough data about an hour. Unknown assignment on your router - most likely someone else has gotten on. Blocking by MAC can be sur-com-vented and man in the middle attacks are possiable. Professional Hackor - Sometimes Security Consultant

                          1 Reply Last reply
                          0
                          • J Johnny

                            I've got an XP laptop and a Mac all networked up together and sat behind a wireless router. Being particularly paranoid, I've tried my hardest to make sure that nothing is visible to the outside world. The router has it's firewall running, as does my XP and Mac. I've got the two computers sharing drives using SMB and, as far as I can tell, I've restricted this just to the computers in question. Naturally the wireless is running WPA. The reason for this post is to see if I can dive into the communal knowledge pool that is codeproject.com, and see if anyone has any gold nuggets of info that might make me feel safer. In particular, does anyone know of a tool I can run to get a list of all connected SMB clients? I was rather disturbed to find, when I looked in the DHCP list on my router, that some anonymous machine was also listed. I'm hoping it was just a stale entry from before I moved the wireless to WPA, but I want to make sure.

                            B Offline
                            B Offline
                            Bradley McGuffey
                            wrote on last edited by
                            #13

                            For anyone wanting to know all the gorey details of security and how to go about securing an home network there is no better place to go than Security Now. It is a podcast by a computer genious and Leo Laporte (from old TechTV). They have all sessions downloadable with notes on the website, http://www.grc.com/SecurityNow.htm Good luck. Bradley McGuffey MBS Management, LLC www.mypeople.com 205-824-6846 mcgufbd@charter.net

                            1 Reply Last reply
                            0
                            Reply
                            • Reply as topic
                            Log in to reply
                            • Oldest to Newest
                            • Newest to Oldest
                            • Most Votes


                            • Login

                            • Don't have an account? Register

                            • Login or register to search.
                            • First post
                              Last post
                            0
                            • Categories
                            • Recent
                            • Tags
                            • Popular
                            • World
                            • Users
                            • Groups