Home | Sitemap |

IT Archives


WLAN Cleft can be closed with Firmware Update

Friday, April 3, 2009

get the software below

With a simple packet data, hackers can change the wireless router to be restrained and not crippling the wireless network in the eye immediately. Sohail Ahmad only takes five seconds to disable a WLAN. Attacks are almost similar, such as Auto Immune defense of the man. In this situation, auto defense system even Immune cells attack the healthy and drub it. In the WLAN, conditions not much different. Enough with a package of data that has been manipulated to change the router to be an engine killer who can not distinguish where the good and bad.

Current technology security, encryption methods such as AES and WPA2 with a password of 20 digits or a MAC Address filtering, which only allow the end user is authorized to access the WLAN, many do not do anything. Until now, there is no defense against attacks like this. However, there is still a little excitement. Ahmad can not read the actual data. He can only decide the connection between the client and the server and prevent them are not connected automatically.

Types of DoS attacks (Denial of Service) is a new threat, especially for the commercial WLAN network can only be run with the Hardware Reset. In the private network, this attack seems only fraudulent, but it can happen. Meanwhile, the network usually has hundreds of commercial Access Point. Attacker does not need to own a lot of work. WLAN devices on a standard set of control available to a network device to instruct re-authorization.

During this time, hackers easy to smuggle the package like this to control in the network to know if the MAC address of the router. However, now all the Access Point is protected from attacks such as this. Ahmad Method step further. It was a package to manipulate the data and gave an Originator MAC Address that is not defined in the standard IEEE-802.11 (6xFF). With this package hacker, he requested a client authentication to the routers. Query this simple but very slippy due to the router in general responded by giving the command to the client to logoff. Unfortunately, the client does not automatically log on the router.

Scutum router: protect your network from the dangers of

Manufacturers have set up a Firmware Update. So, make sure you have installed the latest software on the router. To check which version is installed on most routers, open Configuration Page through Web Browser. Typically, the address is "192.168.1.1". Here, you will find a serial number, usually in the "Firmware". When the update is still not available, you should disable SSID Broadcast mode. Developer: http://airtightnetworks.com

0 comments:

Recent Post:

Natural Teak Gallery

Recent Comment:

IT Database- Indonesia

  © Free Blogger Templates Columnus by Ourblogtemplates.com 2008

Back to TOP