Hacking: Basic Security, Penetration Testing and How to Hack (hacking, how to hack, penetration testing, basic security, arduino, python, engineering) by Sharpe Isaac

Hacking: Basic Security, Penetration Testing and How to Hack (hacking, how to hack, penetration testing, basic security, arduino, python, engineering) by Sharpe Isaac

Author:Sharpe, Isaac [Sharpe, Isaac]
Language: eng
Format: azw3
Published: 2015-03-27T04:00:00+00:00


Wireless Security Guidelines

In order to protect yourself from attacks targeted in a wireless fashion you need to make a few adjustments to the entire network.

§ SSID Solution – manufacturers make use of a default SSID to identify the network to various clients. All of the access points broadcast the SSID so that the clients would have a list of networks that they can access. But, for malicious minds, this serves as a way to intrude the network they want to, by knowing their name. Furthermore, a default SSID means that the user didn’t think of changing other configuration settings as well such as the password, which only increases the level of vulnerability of the system.

The best security policy that you can follow is disable the SSID entirely; this will make your router invisible to the public.

§ MAC address filtering – a number of 802.11 access points come with the ability to put restrictions on the devices that have access to the router. You simply need to login to your routers’ setting page and go to the MAC Address Filtering Page/List. This will allow you to enter MAC Addresses for devices you want to allow/restrict. This is a really useful trick as blocking a possible hacker’s MAC address keeps him/her out of the system.

§ WEP Key Encryption – the IEEE standard also lays down an encryption scheme which is not entirely mandatory but nevertheless increases the security capability of the system. The algorithms are RC4-based, 40 bit encryption that prevent a hacker from gaining access to the network’s traffic.

· Hide the network – this is the first & foremost way of protecting the system that can be achieved by hiding the SSID of the network.

· Use a secured key – use the basic WEP key protection to prevent everyday hackers who have no knowledge of advanced techniques gaining access to the network.

· Use WPA/WPA2 – this is a new type of security protocol that employs TKIP, much safer compared to WEP. A WPA key will prevent the system from advanced hacking attacks as well.

· Choose the key wisely – remember, this is where most of the network owners fail to pay heed. Mostly, a network comprises of the person’s vehicle registration number, date of birth, etc. or a combination of these. This makes it fairly easier for a hacker targeting your system in particular. Therefore, it’s best to set a password that comes out of the blue, and remember it by noting it down and placing it in a locked cabinet.

· Use Wireless IDS – wireless IDS or Wireless Intrusion Detection System is a standalone computer that has been developed using specialized hardware & software specifically to detect suspicious behavior on a network. The software installed on the system is usually Linux based and makes use of the same tools as attackers. The special wireless hardware in this case is more powerful than the server’s network card and allows sniffing for suspicious devices, thus pre-emptively protecting the system. It also includes supplementary GPS equipment to locate any rogue attempt and stop the hackers physically.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Popular ebooks
Deep Learning with Python by François Chollet(12585)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7787)
Grails in Action by Glen Smith Peter Ledbrook(7703)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6422)
Kotlin in Action by Dmitry Jemerov(5071)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3830)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3337)
Learning React: Functional Web Development with React and Redux by Banks Alex & Porcello Eve(3089)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2873)
The Art Of Deception by Kevin Mitnick(2611)
Drugs Unlimited by Mike Power(2473)
The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution by Walter Isaacson(2331)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(2316)
Writing for the Web: Creating Compelling Web Content Using Words, Pictures and Sound (Eva Spring's Library) by Lynda Felder(2264)
A Blueprint for Production-Ready Web Applications: Leverage industry best practices to create complete web apps with Python, TypeScript, and AWS by Dr. Philip Jones(2222)
SEO 2018: Learn search engine optimization with smart internet marketing strategies by Adam Clarke(2195)
JavaScript by Example by S Dani Akash(2138)
DarkMarket by Misha Glenny(2086)
Wireless Hacking 101 by Karina Astudillo(2079)
Full-Stack React Projects by Shama Hoque(1992)