Wireless Security: 6 Strategies to Prevent and Grab Hackers and War Drivers

War drivers have been in the company of locating wireless access issues, Maintaining them uploading their own places to the internet. Why would a person do so, nicely for Many reasons:

They need free online access. They could only be war forcing as a hobby; ultimately they might be targeting your system for monetary gain.
Among the most asked questions is how can you prevent hackers from attempting to hack wireless lan and the way to capture them in the action.

Shot from the Back to Hooded Hacker Breaking into Corporate Data Servers from His Underground Hideout. Place Has Dark Atmosphere, Multiple Displays, Cables Everywhere.

Stopping Wardrivers:

1. Use directional antennas: Among the most under mentioned applications of vertical antennas are the way they maintain your wireless signal inside your region of functioning. If you’re employing a more Omni directional antenna that’s causing half of the sign to travel beyond of your building, you get a significant safety issue. Additionally while using your own wireless vertical antenna turndown transmit electricity to lower your signal power if you’re able to.

2. Combine your wireless antennas in your buildings structure or maintain them poor profile. This isn’t pricey, the entire point isn’t allowing your antennas stand out like a sore thumb so anybody driving doesn’t state wow they still have a wireless community. Once more the perfect method to prevent people from attempting to hack on your wireless system would be to keep it concealed.

3. Utilize Kismet or Airsnort – Create a cheap wireless Intrusion detection method. Utilize an old desktop install Linux, set up a USB wireless adapter or PCI wireless adapter and flourish you’ve got your wireless warfare driver stopper. The two Kismet along with airsnort will alarm you if wireless customers are probing your system. When a wireless client is still utilizing netstumber rather than connecting networks they’ll be located by Kismet. The wireless adapters MAC address will be stored along with other specifics of this operating system. The majority of the time that these may be false strikes but should you become aware of a routine of the exact same MAC address probing systems you might have hacker problems.

4. Security Cameras – Regardless of how hard you strive to not have your sign bleed out of your operations place it will. . .to a stage. Probe your network as though you have been a wardriver. Do not only use a typical wireless adapter to learn where you can discover your system. You are going to want to use an extremely directional antenna to observe just how far off it’s possible to find your network. As soon as you understand your weak points set up several inexpensive security cameras to track those regions.

5. Installation a Honey Pot – Provide the Wardriver exactly what they need, a system to hack on. Simply take an entry point link into a standalone switch with a different crap computer attached to this change. Title with the SSID something Feeling significant like host WLAN and title the pc Database. Eventually use a weak password or merely abandon the access point with no security. Script kiddies who state that they”hack programs” are linking to receptive wireless lans without a security. If you provide them a”Crucial sounding SSID using a”database to hack on” this can help keep them occupied till it’s possible to track them down. There are lots of honeypot apps commercial and free which will simulate servers or networks but are actually only recording all of the hackers’ data and sorts of strikes.

6. Utilize a RADIUS Server – RADIUS servers need Wireless customers to authenticate using a username and password not only just with a PSK (Pre- Shared Key). Together with a RADIUS server that you truly don’t understand who’s in your WLAN. Having a RADIUS server that you understand who’s getting your WLAN and if they obtained it. Additionally a RADIUS server provides you the capacity of producing policies for occasions your WLAN could be retrieved along with other necessary security features that the wireless customers must have empowered their own computers.

Now let us put everything together to grab our hacker. First you’re going through your everyday routine of checking logs onto your own Kismet IDS server and you also observe the exact same MAC address probing networks although not linking. Next you assess your aid tickets and also notice that at 1 area of their construction customers were having difficulty connecting to the wireless community or else they had difficulty staying connected.
Flags go up on your mind, which means you go on to a honeypot machine and assess that. You notice that it had been obtained around precisely the exact same period of this Kismet logs revealed a customer probing the system. The honey pot listed the MAC address of this WAR driver as well as the operating system along with the name.

Next you assess your safety cameras for this time but do not really detect anything. So for the next few days you continue tracking your honey pot machine and observe the hacker attempt to crack on the WLAN and the database . The entire procedure for breaking wireless security is really two measures. Step one is collecting enough packets to your breaking up program to decode. This entire procedure for collecting sufficient packs may takes weeks or days not 5 minutes. Now as soon as you have sufficient bundles 64 bit WEP encryption can be broken in less that 5 seconds. 128 bit encryption may take several times more, WPA using TKIP and AES encryption may takes weeks to decode.

My entire point is you have some opportunity to grab your hacker since he’ll be back several times, assuming you have the simple safety features in place.
Now as soon as you’ve got all of your logs compiled along with your honey pot information you ought to have a fantastic idea the way the hacker acts. Assess your safety cameras and you likely observe the exact same car or individual in the region throughout that time. Just take that advice for your in house safety and let them watch for this car or individual and telephone law enforcement.

If you’re lucky police or security will place him apprehend him. Convicting their may be demanding but together with your gathered logs and movie you ought to have a great deal of proof to assist your situation.

Leave a Reply

Your email address will not be published. Required fields are marked *