Linux - NewbieThis Linux forum is for members that are new to Linux.
Just starting out and have a question?
If it is not in the man pages or the how-to's this is the place!
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
But would that be useful to discover the mac addresses without having a connection to the network?
That article seems to talk on discovering our own mac address, see the bold: how-do-i-find-out-the-mac-address-of-my-linux-or-freebsd-system
What I'm specifically interested is to know whether the folling scenario is possible, and if it is, how:
A car pulls over and parks in front of my house so the driver can go to the grocery store that is across the street. There's another person on the car and he/she stays there with his/her notebook. This person sees my wi-fi and tries to connect to it, but there's a strong password preventing the connection and also a MAC filter. How would this person know the MAC addresses on the filter list so he/she could clone it? Would it be easy to clone the address in this scenario?
Quote:
Originally Posted by Ztcoracat
You also may want to look into machine hardening-
-Don't allow the system to boot to removable media.
-Require a BIOS password (as far as boot options are concerned)
Done already
Quote:
Originally Posted by Ztcoracat
-Require a Grub password and encrypt your fs and HDD-
I use syslinux instead of GRUB but I'm looking forward to know if a syslinux password is necessary since I encrypt the whole drive.
Quote:
Originally Posted by Ztcoracat
I have to agree with Habitual:-
Wired is best especially if your pc is a production machine.
Well my machine does connect to the router via cable, is that what you mean here?
My machine falls into both cases: I use it for work and for home use as well (e-Mail; Steam; VLC; Youtube; you get the picture)
Quote:
Originally Posted by haertig
Well, of course. But that's what you said when you phrased your question ... "and an attacker manages to crack the wireless security"
I see, my bad Didn't know it's possible.
Quote:
Originally Posted by haertig
Hey, I was just trying to help you. In your initial post, you appeared quite the newbie to all this. You even stated as much. You presented a list of items (which a normal person would assume to be questions you were having about your set up). So I responded to those questions, one by one, with my thoughts and personal experiences. Now you are presenting yourself as a security genious that knows it all.
That's wasn't my intention. Forgive me if that's the image you got from me.
Quote:
Originally Posted by haertig
So why did you ask the questions in the first place?
I didn't know it would be that easy to get the MAC addresses on the network, sorry.
Quote:
Originally Posted by haertig
Whatever. Strange post. But I think you are probably competant enough to manage things on your own, and you should do well.
A car pulls over and parks in front of my house so the driver can go to the grocery store that is across the street. There's another person on the car and he/she stays there with his/her notebook. This person sees my wi-fi and tries to connect to it, but there's a strong password preventing the connection and also a MAC filter. How would this person know the MAC addresses on the filter list so he/she could clone it? Would it be easy to clone the address in this scenario?
1) If you are that concerned, it would be best to not use wireless and set up your home network with only wired connections.
2) Worrying about such a scenario assumes you believe people with the knowhow would be interested in you and your files. Are you really important enough to get the attention of such people?
1) If you are that concerned, it would be best to not use wireless and set up your home network with only wired connections.
Can't, he bought the Router so they could use their cellphones and tablets. The only computer connect through cable is mine.
Quote:
Originally Posted by Randicus Draco Albus
2) Worrying about such a scenario assumes you believe people with the knowhow would be interested in you and your files. Are you really important enough to get the attention of such people?
Would it be easy to clone the address in this scenario?
Sadly so yes but I don't know how they do it-
I met a mathematical genius in 2000 and he was able to solve any combination of numbers on this earth in any form (basic math, calculus, Algeria, etc.) and he cracked the code on my system.
FWIW, Amarildo a IT Tech that I communicate with made it clear to me that it's pretty hard to break the WPA password and encryption but he did say that it's not impossible.
As Randicus Draco Albus mentioned if your that concerned; switching to a wired connection will most likely put your mind at ease.
A car pulls over and parks in front of my house so the driver can go to the grocery store that is across the street. There's another person on the car and he/she stays there with his/her notebook. This person sees my wi-fi and tries to connect to it, but there's a strong password preventing the connection and also a MAC filter. How would this person know the MAC addresses on the filter list so he/she could clone it? Would it be easy to clone the address in this scenario?
Easiest way is to use a security penetration Linux Distro. Kali. Backtrack. etc. The tools you need are all there.
Since you really seem to want to know the technical steps to do this, here's a tutorial that illustrates one way to accomplish the task (if you can tolerate the music playing during the video):
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.