Redian新闻
>
如果有人盗用你的WIRELESS,你可以这么做 *_^
avatar
如果有人盗用你的WIRELESS,你可以这么做 *_^# Security - 系统安全
w*a
1
http://www.ex-parrot.com/~pete/upside-down-ternet.html
Mythic Beasts, shell accounts, cvs hosting, co-location, virtual servers
Upside-Down-Ternet
My neighbours are stealing my wireless internet access. I could encrypt it
or alternately I could have fun.
Split the network
I'm starting here by splitting the network into two parts, the trusted half
and the untrusted half. The trusted half has one netblock, the untrusted a
different netblock. We use the DHCP server to identify mac addresses to give
avatar
k*q
2
没用,只要可以进入wireless network,所有packet都能看的到,这里设的
这个mac地址自然也是可以伪造的.
这个和在AP上边用MAC做访问控制一样,已经被证明是没有效果的,与其这么
麻烦,还不如不用WEP,用WPA之类的,设密码复杂一点的.

half
give
/$
/$
/$
/$

【在 w***a 的大作中提到】
: http://www.ex-parrot.com/~pete/upside-down-ternet.html
: Mythic Beasts, shell accounts, cvs hosting, co-location, virtual servers
: Upside-Down-Ternet
: My neighbours are stealing my wireless internet access. I could encrypt it
: or alternately I could have fun.
: Split the network
: I'm starting here by splitting the network into two parts, the trusted half
: and the untrusted half. The trusted half has one netblock, the untrusted a
: different netblock. We use the DHCP server to identify mac addresses to give

avatar
w*a
4
干脆再补充一句吧,仔细看一下上边的URL的图片就明白了。
avatar
k*q
5
哦,了解,只看了前半截.
还有一个类似的东西是dino在bluehat上边的一个东西.
http://www.theta44.org/main.html
All Your Layers Are Belong To Us
PacSec.JP 2004, November 2004, Tokyo, Japan.
Microsoft BlueHat 2005, Redmond, WA.
CanSecWest/core05, May 2005, Vancouver, Canada.
IEEE Information Assurance Workshop, June 2005, West Point, NY.

【在 w***a 的大作中提到】
: 干脆再补充一句吧,仔细看一下上边的URL的图片就明白了。
相关阅读
logo
联系我们隐私协议©2024 redian.news
Redian新闻
Redian.news刊载任何文章,不代表同意其说法或描述,仅为提供更多信息,也不构成任何建议。文章信息的合法性及真实性由其作者负责,与Redian.news及其运营公司无关。欢迎投稿,如发现稿件侵权,或作者不愿在本网发表文章,请版权拥有者通知本网处理。