Jump to content

How secure is 128 bit Wep with MAC Filtering


How secure is a Wireless LAN with 128 bit WEP and MAC Filtering enabled?  

24 members have voted

  1. 1. How secure is a Wireless LAN with 128 bit WEP and MAC Filtering enabled?

    • Very secure, no problems. I would be happy connecting.
      7
    • Secure, but I would be wary connecting.
      2
    • OK secure enough for home use.
      6
    • Not Secure, but would connect for short periods.
      2
    • Wouldn't touch it!
      0
    • Don't trust wireless networks at all.
      1


Recommended Posts

  • 2 weeks later...

It all depends.. where are you using it? what are you using it for? how often do you change the key?

I've been doing work with stuff like that lately and it always depends... even if you lock down the connection what about the hardware being used? could they be broken into? If you're just asking about just the connection itself if you're just surfing at home it should be secure enough but I wouldn't trust it for a corporate environment

Link to comment
Share on other sites

first of all i would like too say i would vote twice if i could... 1 for the first option and 1 for the last option. I feel secure that our home network is fine as most people won't ever get that desperate.

secondly.. I would NEVER use wireless. I love having 100 mbps connection and not have to worry about a bunch of settings like WEP and so on. and if anyone is "sniffing" the wireless *dunno if they can do that...* Security is my main concern in both wired and wireless networks.

Link to comment
Share on other sites

I agree with what Biohazard is saying, if I was to use it for work I would go for WPA encryption as this is supposed to be more secure than WEP.

Yes you can "sniff" the wireless out..... and you can "record" the packets, and with enough information you can extract the WEP key. :whistle:

Link to comment
Share on other sites

This is just my home setup for a desktop and a laptop.

There does not appear to be anyother wireless networks in the area and I think I would notice in the car parking area with a pringle can and a laptop!

The range outside the building is pretty limited as well, went wandering with the laptop!

Link to comment
Share on other sites

Even if someone cracks your key, they still need to spoof your MAC address which is pretty hard to spoof unless someone else knows it...

Sure, if you want to connect to it, which most likely isen't your purpose ... Your purpose would be to sniff passwords and private traffic, which is quite easy since a WEP key can be cracked within minuts ...

Personally I use it at home for me laptop, but thats only because I live in the middle of nowhere and because Im not really transfering anything important ... Anywhere else I would'n trust it to secure my transmissions ... not even those "short transmissions" ...

Also, having using a wireless connection not only puts your wireless transmissions at risk, it puts your entire network. If someone manages to log onto your network by cracking the WEP and spoofing a mac he might as well ARP poision all your non-wireless hosts and sniff even normal traffic ...

Link to comment
Share on other sites

IMO MAC address filtering is not as safe as most people think. When a client sends an 802.11 frame (encrypted or not), the header of the frame (which contains the MAC address) is never encrypted. This means people can use a wireless sniffer such as kismet and find all the clients' mac address' in a matter of minutes. However, WEP encryption at 128-bit can be decrypted by analysing about 100mb of traffic. So, you can change the key every day and you would be pretty secure.

Link to comment
Share on other sites

crispy how recently have you tried cracking wep?

because weak ivs no longer exist with neweer hardware had losts of fun trying to crack my own ap after about 4 days of constant traffic i still had no weak ivs and airsnort had not broken into it

for home use though i would recommend firewall, no dhcp, wep, wpa mac filtering, and hiding the ssid. for a buisness i would look at adding a vpn over the network and haveing them completely seperate from most computers on your network. eg in a dmz controled by an up to date smoothwall/or something similar box

Link to comment
Share on other sites

crispy how recently have you tried cracking wep?

because weak ivs no longer exist with neweer hardware had losts of fun trying to crack my own ap after about 4 days of constant traffic i still had no weak ivs and airsnort had not broken into it

Quite recently actually ... But you're completely right; A patched system would take ages to crack if not imposible ... However, there are still many networks out there with old and unpatched hardware ... Thats the reason I would'n trust WEP anywhere but on my home network ...

Link to comment
Share on other sites

crispy pitty we cant get everyone to upgrade :(

but also have you tried kismet i kinda gues syou do a little bit of wardriving there

if you do wardrive look for a post in janurary that should have about 4000kms of road wardriven and even then i wont be getting very far just down to adelaide then to melbourne but should look impressive anyway

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...