tailieunhanh - wifi security phần 7

Bộ lọc địa chỉ MAC không phải là một phần của các đặc điểm kỹ thuật IEEE , tuy nhiên họ được tìm thấy trong nhiều điểm truy cập Wi-Fi như một cơ chế bảo mật tùy chọn. Mục đích của nó là để từ chối truy cập đến bất kỳ thẻ giao diện mạng với một địa chỉ là không được phép. | 50 CHAPTER 3. BREAKING THE SECURITY OF WI-FI Security Supplements Bypassing MAC Address Filters MAC address filters are not part of the IEEE specification nonetheless they are found in many Wi-Fi access points as an optional security mechanism. Its purpose is to deny access to any network interface card with an address that is not authorized. A table of authorized MAC addresses are stored in the access point. It is effective at keeping novice neighbors off an open network. However MAC addresses are never kept a secret and a network card may change its address to match someone else s address. All that has to be done to bypass the security is to capture a frame from a client wait for the client to disconnect and then change to the clients MAC address and connect. Avoiding Interference If two computers share a MAC address simultaneously one for a client and one for an intruder they would end up interfering with each other to the point where communications would be disrupted and discontinued. But if the intruder only receives responses which are discarded and ignored by the client he may tunnel all his communications through the use of only these protocols. To do this the intruder needs an opening on the other side of the tunnel he must have control of another computer already on the Internet. OpenVPN is a set of tunneling software available for many platforms including Linux and windows. It has the ability to tunnel traffic through only UDP packets or a single TCP connection. Additionally there are features that allow the tunnel to be encrypted and authenticated at both ends of the tunnel. The rest of the section demonstrates how an OpenVPN tunnel is created from Linux. The ifconfig program is a networking tool to configure network interfaces in Linux. route is a program for configuring network routes so that network traffic is transmitted over the correct network. First the endpoint of the tunnel must be opened this is done with the command .

TỪ KHÓA LIÊN QUAN
crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.