06-07-2009, 02:15 PM
chuzie Wrote:Basically WEP and WPA(2) are not perfect. WEP is an easy crack and is just a matter of capturing "data" and reverse engineering it to determine the encryption. WPA is harder because you need someone who is actively using the connection (transferring data) and a massive password database must be used. It can sometimes be time consuming depending on the complexity of the password but it can be done.
I first started with a goal to ensure my network was secure and then found it challenging to see how secure others' are. Just to be clear, it is not illegal to jump on someoneââ¬â¢s network however, once you start using their bandwidth, that is considered stealing and is illegal so that is where I draw the line.
Bluetooth is the next medium I plan on learning about. So many cell phones and so little time.
Check out remote-exploit.org for info on BT3 and 4 (a Linux based OS commonly used) The learning curve is steep at first but if you know Linux you are way ahead of the game.
Insert geek comments here _____
HUH? I guess this one of the signs that I,m getting old.:rubeyes:cratchhe:
Stupid hurts when it catches up, and it WILL catch up!
[SIZE="4"]Founding member of the "cheap bastards 4x4 gang''[/SIZE]
[SIZE="4"]Founding member of the "cheap bastards 4x4 gang''[/SIZE]