LinuxQuestions.org
Welcome to the most active Linux Forum on the web.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Newbie
User Name
Password
Linux - Newbie This Linux forum is for members that are new to Linux.
Just starting out and have a question? If it is not in the man pages or the how-to's this is the place!

Notices


Reply
  Search this Thread
Old 10-09-2014, 10:43 PM   #16
Amarildo
Member
 
Registered: Jun 2014
Posts: 176

Original Poster
Rep: Reputation: Disabled

Quote:
Originally Posted by Ztcoracat View Post
They could use this link that I found to find out-
http://www.cyberciti.biz/faq/how-do-...reebsd-system/
But would that be useful to discover the mac addresses without having a connection to the network?
That article seems to talk on discovering our own mac address, see the bold: how-do-i-find-out-the-mac-address-of-my-linux-or-freebsd-system

What I'm specifically interested is to know whether the folling scenario is possible, and if it is, how:

A car pulls over and parks in front of my house so the driver can go to the grocery store that is across the street. There's another person on the car and he/she stays there with his/her notebook. This person sees my wi-fi and tries to connect to it, but there's a strong password preventing the connection and also a MAC filter. How would this person know the MAC addresses on the filter list so he/she could clone it? Would it be easy to clone the address in this scenario?

Quote:
Originally Posted by Ztcoracat View Post
You also may want to look into machine hardening-
-Don't allow the system to boot to removable media.
-Require a BIOS password (as far as boot options are concerned)
Done already

Quote:
Originally Posted by Ztcoracat View Post
-Require a Grub password and encrypt your fs and HDD-
I use syslinux instead of GRUB but I'm looking forward to know if a syslinux password is necessary since I encrypt the whole drive.

Quote:
Originally Posted by Ztcoracat View Post
I have to agree with Habitual:-
Wired is best especially if your pc is a production machine.
Well my machine does connect to the router via cable, is that what you mean here?
My machine falls into both cases: I use it for work and for home use as well (e-Mail; Steam; VLC; Youtube; you get the picture)

Quote:
Originally Posted by haertig View Post
Well, of course. But that's what you said when you phrased your question ... "and an attacker manages to crack the wireless security"
I see, my bad Didn't know it's possible.

Quote:
Originally Posted by haertig View Post
Hey, I was just trying to help you. In your initial post, you appeared quite the newbie to all this. You even stated as much. You presented a list of items (which a normal person would assume to be questions you were having about your set up). So I responded to those questions, one by one, with my thoughts and personal experiences. Now you are presenting yourself as a security genious that knows it all.
That's wasn't my intention. Forgive me if that's the image you got from me.

Quote:
Originally Posted by haertig View Post
So why did you ask the questions in the first place?
I didn't know it would be that easy to get the MAC addresses on the network, sorry.

Quote:
Originally Posted by haertig View Post
Whatever. Strange post. But I think you are probably competant enough to manage things on your own, and you should do well.
Thanks.

Last edited by Amarildo; 10-09-2014 at 10:53 PM.
 
Old 10-09-2014, 11:13 PM   #17
Randicus Draco Albus
Senior Member
 
Registered: May 2011
Location: Hiding somewhere on planet Earth.
Distribution: No distribution. OpenBSD operating system
Posts: 1,711
Blog Entries: 8

Rep: Reputation: 635Reputation: 635Reputation: 635Reputation: 635Reputation: 635Reputation: 635
Quote:
Originally Posted by Amarildo View Post
A car pulls over and parks in front of my house so the driver can go to the grocery store that is across the street. There's another person on the car and he/she stays there with his/her notebook. This person sees my wi-fi and tries to connect to it, but there's a strong password preventing the connection and also a MAC filter. How would this person know the MAC addresses on the filter list so he/she could clone it? Would it be easy to clone the address in this scenario?
1) If you are that concerned, it would be best to not use wireless and set up your home network with only wired connections.
2) Worrying about such a scenario assumes you believe people with the knowhow would be interested in you and your files. Are you really important enough to get the attention of such people?
 
Old 10-09-2014, 11:32 PM   #18
Amarildo
Member
 
Registered: Jun 2014
Posts: 176

Original Poster
Rep: Reputation: Disabled
Quote:
Originally Posted by Randicus Draco Albus View Post
1) If you are that concerned, it would be best to not use wireless and set up your home network with only wired connections.
Can't, he bought the Router so they could use their cellphones and tablets. The only computer connect through cable is mine.
Quote:
Originally Posted by Randicus Draco Albus View Post
2) Worrying about such a scenario assumes you believe people with the knowhow would be interested in you and your files. Are you really important enough to get the attention of such people?
If I were, would I openly tell everyone here?
 
Old 10-09-2014, 11:40 PM   #19
Ztcoracat
LQ Guru
 
Registered: Dec 2011
Distribution: Slackware, MX 18
Posts: 9,484
Blog Entries: 15

Rep: Reputation: 1176Reputation: 1176Reputation: 1176Reputation: 1176Reputation: 1176Reputation: 1176Reputation: 1176Reputation: 1176Reputation: 1176
Code:
Would it be easy to clone the address in this scenario?
Sadly so yes but I don't know how they do it-

I met a mathematical genius in 2000 and he was able to solve any combination of numbers on this earth in any form (basic math, calculus, Algeria, etc.) and he cracked the code on my system.

FWIW, Amarildo a IT Tech that I communicate with made it clear to me that it's pretty hard to break the WPA password and encryption but he did say that it's not impossible.

As Randicus Draco Albus mentioned if your that concerned; switching to a wired connection will most likely put your mind at ease.
 
Old 10-10-2014, 01:00 AM   #20
haertig
Senior Member
 
Registered: Nov 2004
Distribution: Debian, Ubuntu, LinuxMint, Slackware, SysrescueCD, Raspbian, Arch
Posts: 2,331

Rep: Reputation: 357Reputation: 357Reputation: 357Reputation: 357
Quote:
Originally Posted by Amarildo View Post
A car pulls over and parks in front of my house so the driver can go to the grocery store that is across the street. There's another person on the car and he/she stays there with his/her notebook. This person sees my wi-fi and tries to connect to it, but there's a strong password preventing the connection and also a MAC filter. How would this person know the MAC addresses on the filter list so he/she could clone it? Would it be easy to clone the address in this scenario?
Easiest way is to use a security penetration Linux Distro. Kali. Backtrack. etc. The tools you need are all there.

Since you really seem to want to know the technical steps to do this, here's a tutorial that illustrates one way to accomplish the task (if you can tolerate the music playing during the video):

http://www.youtube.com/watch?v=tVECR_CihkM
 
1 members found this post helpful.
Old 10-10-2014, 01:15 AM   #21
Amarildo
Member
 
Registered: Jun 2014
Posts: 176

Original Poster
Rep: Reputation: Disabled
Thank you heartig!

Thanks Ztcoracat
 
Old 10-10-2014, 01:37 AM   #22
haertig
Senior Member
 
Registered: Nov 2004
Distribution: Debian, Ubuntu, LinuxMint, Slackware, SysrescueCD, Raspbian, Arch
Posts: 2,331

Rep: Reputation: 357Reputation: 357Reputation: 357Reputation: 357
You might want to check out http://sectools.org/ to become more familiar with the tools of the trade.

I believe the majority of these tools are available on the Network Security Toolkit Linux distro. http://www.networksecuritytoolkit.org/nst/index.html
 
Old 10-10-2014, 01:46 AM   #23
Ztcoracat
LQ Guru
 
Registered: Dec 2011
Distribution: Slackware, MX 18
Posts: 9,484
Blog Entries: 15

Rep: Reputation: 1176Reputation: 1176Reputation: 1176Reputation: 1176Reputation: 1176Reputation: 1176Reputation: 1176Reputation: 1176Reputation: 1176
Quote:
Originally Posted by Amarildo View Post
Thank you heartig!

Thanks Ztcoracat
Your Welcome!-
 
1 members found this post helpful.
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LXer: Microsoft disregards Linux as threat. Big mistake LXer Syndicated Linux News 0 08-14-2011 10:50 PM
MadWiFi security threat... fpd MEPIS 9 04-29-2007 01:41 PM
Is this a security threat? ifm Linux - Security 3 06-14-2002 10:58 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Newbie

All times are GMT -5. The time now is 07:47 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration