Wireless Security: 6 Approaches to Stop and Catch Hackers and War Drivers

War drivers are in the business of locating wireless access points, recording them uploading their places to the internet. Why would someone do so, nicely for Many reasons:

First they need free online access. They could only be war forcing as a hobby; finally they might be targeting your network for monetary gain.
Among the most asked questions is how can you prevent hackers from attempting to hack your wireless lan and the way to capture them in the action.

Stopping Wardrivers:

1. Use directional antennas: Among the most under mentioned applications of directional antennas are how they keep your wireless signal in your field of functioning. If you’re employing a more Omni directional antenna that is causing half the signal to travel outside of your building, you get a significant security problem. Also while using your own wireless vertical antenna turndown transmit electricity to reduce your signal strength if you can.

2. Combine your wireless antennas in your buildings structure or keep them low profile. This isn’t expensive, the whole point isn’t letting your antennas stand out like a sore thumb so anyone driving doesn’t saywow they still have a wireless network. Once more the best way to prevent people from attempting to hack your wireless network would be to keep it hidden.

3. Use Kismet or Airsnort – Make a cheap wireless Intrusion detection system. Use an older desktop computer install Linux, set up a USB wireless adapter or PCI wireless adapter and boom you have your wireless war driver stopper. The two Kismet along with airsnort will alarm you if wireless clients are probing your network. If a wireless client is using netstumber rather than connecting networks they’ll be discovered by Kismet. Their wireless adapters MAC address will be logged and other details of their operating system. Most of the time that these may be false hits but should you see a pattern of the exact same MAC address probing systems you might have hacker issues.

4. Security Cameras – No matter how hard you strive to not have your sign bleed outside your operations area it will. . .to a point. Probe your own network as if you were a wardriver. Don’t just use a normal wireless adapter to discover where you still can discover your system. You might want to use a highly directional antenna to find out how far off you can find your own network. As soon as you know your weak points set up some inexpensive security cameras to track those places.

5. Setup a Honey Pot – Provide the Wardriver what they want, a network to hack. Take an entry point link it to a standalone switch with another junk computer connected to this switch. Title with the SSID something sounding significant like host WLAN and name the pc Database. Eventually use a weak password or just leave the access point without any security. Script kiddies who say that they”hack networks” really are linking to open wireless lans without a security. If you give them a”Crucial sounding SSID with a”database to hack on” this will keep them occupied till it’s possible to track them down. There are many honeypot apps free and commercial which will simulate servers or networks but are actually only recording all of the hackers’ information and kinds of attacks.

6. Use a RADIUS Server – RADIUS servers need Wireless clients to authenticate with a username and password not just with a PSK (Pre- Shared Key). With out a RADIUS server you really don’t know who’s in your WLAN. With a RADIUS server that you understand who’s accessing your WLAN and if they obtained it. Also a RADIUS server gives you the capability of creating policies for instances your WLAN can be accessed and other required security features that the wireless customers must have enabled their computers.

Now let’s put everything together to grab our hacker. First you’re going through your everyday routine of checking logs onto your Kismet IDS server and you also notice the same MAC address probing networks although not linking. Next you check your help tickets and also notice that at one area of the building customers were having difficulty connecting to the wireless network or else they had difficulty staying connected.
Flags go up on your head, so you go on to your honeypot server and check that. You notice that it had been obtained around the identical time of the Kismet logs showed a client probing the system. The honey pot listed the MAC address of this WAR driver as well as the operating system and the computer name.

Next you assess your security cameras for this time but don’t really detect anything. So for the next few days you keep tracking your honey pot machine and observe the hacker try and crack on the WLAN and the database . The whole process of dividing wireless encryption is truly two measures. Step one is collecting enough packets for your breaking up program to crack. This entire procedure for gathering enough packets can takes weeks or days not five minutes. Now once you have sufficient packets 64 bit WEP encryption can be cracked in less that 5 seconds. 128 bit encryption may take many times more, WPA using TKIP and AES encryption can takes weeks to crack.

My entire point is that you have some opportunity to catch your hacker because he’ll be back several times, assuming that you have the basic security features in place.
Now as soon as you’ve got all your logs compiled and your honey pot data you need to have a fantastic idea the way the hacker acts. Check your security cameras and you likely observe the same car or individual in the area throughout that time. Take that advice to your in house safety and tell them to watch for this car or person and telephone law enforcement.

If you are lucky security or police will spot him and apprehend him. Convicting him or her may be demanding but with your videos that are compiled and video you need to have a lot of evidence to assist your situation.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.