Oh, and so I'm not using WEP anymore, so the only odd things coming out of my printer should be odd things that I sent it myself.
Spoilsport! Glad you got it sorted though. Please do heed the warnings about WEP. The tools I use are available to anybody and require no effort to run.
Heck, I've punctured a number of WPA systems recently (although that's brute force and ignorance more than anything). Make sure your network keys are not dictionary words and as long as is practical. I can dictionary search a WPA/WPA2 SSID in about 45 minutes and 4 days of bruteforcing will generally knock off most keys ~ 7 characters or less.
▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔
You only ever need two tools in life. If it moves and it shouldn't use Duct Tape. If it does not move and it should use WD40.
sylvie369 said...
Thanks for the advice - I had no idea that WEP was outdated/insecure.
I'm using good password practice. Does turning off broadcast of the SSID help security, or is that just wishful thinking?
Wishful thinking. It's probably as effective as MAC address filtering (ie it requires a little extra sniffing to find one out).
For domestic use, WPA2 with AES encryption still provides about the best security. Currently the only way to break that is bruteforce.
Use a non-default SSID also. There are plenty of bruteforce rainbow tables out there for default SSID's. If you have a non-standard SSID then the attacker needs to calculate everything again (which takes a while, even on a CUDA GPU).
A non standard SSID, and a _long_, _random_ key are your best protection currently.
▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔
You only ever need two tools in life. If it moves and it shouldn't use Duct Tape. If it does not move and it should use WD40.
Comments
Spoilsport! Glad you got it sorted though. Please do heed the warnings about WEP. The tools I use are available to anybody and require no effort to run.
Heck, I've punctured a number of WPA systems recently (although that's brute force and ignorance more than anything). Make sure your network keys are not dictionary words and as long as is practical. I can dictionary search a WPA/WPA2 SSID in about 45 minutes and 4 days of bruteforcing will generally knock off most keys ~ 7 characters or less.
▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔
You only ever need two tools in life. If it moves and it shouldn't use Duct Tape. If it does not move and it should use WD40.
I'm using good password practice. Does turning off broadcast of the SSID help security, or is that just wishful thinking?
Wishful thinking. It's probably as effective as MAC address filtering (ie it requires a little extra sniffing to find one out).
For domestic use, WPA2 with AES encryption still provides about the best security. Currently the only way to break that is bruteforce.
Use a non-default SSID also. There are plenty of bruteforce rainbow tables out there for default SSID's. If you have a non-standard SSID then the attacker needs to calculate everything again (which takes a while, even on a CUDA GPU).
A non standard SSID, and a _long_, _random_ key are your best protection currently.
▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔▔
You only ever need two tools in life. If it moves and it shouldn't use Duct Tape. If it does not move and it should use WD40.
·