06-07-2009, 12:55 PM
Basically WEP and WPA(2) are not perfect. WEP is an easy crack and is just a matter of capturing "data" and reverse engineering it to determine the encryption. WPA is harder because you need someone who is actively using the connection (transferring data) and a massive password database must be used. It can sometimes be time consuming depending on the complexity of the password but it can be done.
I first started with a goal to ensure my network was secure and then found it challenging to see how secure others' are. Just to be clear, it is not illegal to jump on someone’s network however, once you start using their bandwidth, that is considered stealing and is illegal so that is where I draw the line.
Bluetooth is the next medium I plan on learning about. So many cell phones and so little time.
Check out remote-exploit.org for info on BT3 and 4 (a Linux based OS commonly used) The learning curve is steep at first but if you know Linux you are way ahead of the game.
Insert geek comments here _____
I first started with a goal to ensure my network was secure and then found it challenging to see how secure others' are. Just to be clear, it is not illegal to jump on someone’s network however, once you start using their bandwidth, that is considered stealing and is illegal so that is where I draw the line.
Bluetooth is the next medium I plan on learning about. So many cell phones and so little time.
Check out remote-exploit.org for info on BT3 and 4 (a Linux based OS commonly used) The learning curve is steep at first but if you know Linux you are way ahead of the game.
Insert geek comments here _____
'77 351w- Explorer EFI, 4R70W, 4-link, lockers, 4.56, 35" MT/Rs with a severe rock addiction.mokin:
Roads? Where we're going, we don't need roads.
Roads? Where we're going, we don't need roads.