大多數愛好者真的有可能入侵wi-fi網路嗎?

雖然我們大多數人都不必擔心有人入侵我們的Wi-Fi網路,但對於一個狂熱者來說,入侵一個人的Wi-Fi網路有多難呢?今天的超級使用者問答帖子回答了一位讀者關於Wi-Fi網路安全的問題。...

大多數愛好者真的有可能入侵wi-fi網路嗎?

雖然我們大多數人都不必擔心有人入侵我們的Wi-Fi網路,但對於一個狂熱者來說,入侵一個人的Wi-Fi網路有多難呢?今天的超級使用者問答帖子回答了一位讀者關於Wi-Fi網路安全的問題。

今天的問答環節是由SuperUser提供的,SuperUser是Stack Exchange的一個分支,是一個由社群驅動的問答網站分組。

圖片由Brian Klug(Flickr)提供。

問題

超級使用者讀者Sec想知道,大多數狂熱者是否真的有可能入侵Wi-Fi網路:

I heard from a trusted computer security expert that most enthusiasts (even if they are not professionals) using only guides from the Internet and specialized software (i.e. Kali Linux with the included tools), can break through your home router security.

People claim that it is possible even if you have:

  • A strong network password
  • A strong router password
  • A hidden network
  • MAC filtering

I want to know if this is a myth or not. If the router has a strong password and MAC filtering, how can that be bypassed (I doubt they use brute-force)? Or if it is a hidden network, how can they detect it, and if it is possible, what can you do to make your home network really secure?

As a junior computer science student, I feel bad because sometimes hobbyists argue with me on such subjects and I do not have strong arguments or can not explain it technically.

這真的有可能嗎?如果有可能的話,Wi-Fi網路的哪些“弱點”是愛好者們關注的焦點?

答案

超級使用者貢獻者davidgo和reirab為我們提供了答案。首先,戴維戈:

Without arguing the semantics, yes, the statement is true.

There are multiple standards for Wi-Fi encryption including WEP, WPA, and WPA2. WEP is compromised, so if you are using it, even with a strong password, it can be trivially broken. I believe that WPA and WPA2 are a lot harder to crack though (but you may have security issues relating to WPS which bypass this). Also, even reasonably hard passwords can be brute-forced. Moxy Marlispike, a well known hacker offers a service to do this for about US $30 using cloud computing – although it is not guaranteed.

A strong router password will do nothing to prevent someone on the Wi-Fi side from tran**itting data through the router, so that is irrelevant.

A hidden network is a myth. While there are boxes to make a network not appear in a list of sites, the clients beacon the WIFI router, thus its presence is trivially detected.

MAC filtering is a joke as many (most/all?) Wi-Fi devices can be programmed/reprogrammed to clone an existing MAC address and bypass MAC filtering.

Network security is a big subject, and not something amenable to a SuperUser question. But the basics are that security is built up in layers so that even if some are compromised, not all are. Also, any system can be penetrated given enough time, resources, and knowledge; so security is actually not so much a question of “can it be hacked”, but “how long will it take” to hack. WPA and a secure password protect against “Joe Average”.

If you want to enhance the protection of your Wi-Fi network, you can view it as a transport layer only, then encrypt and filter everything going across that layer. This is overkill for the vast majority of people, but one way you could do this would be to set the router to only allow access to a given VPN server under your control, and require each client to authenticate across the Wi-Fi connection across the VPN. Thus, even if the Wi-Fi is compromised, there are other (harder) layers to defeat. A subset of this behaviour is not uncommon in large corporate environments.

A simpler alternative to better securing a home network is to ditch Wi-Fi altogether and require only cabled soluti***. If you have things like cell phones or tablets, this may not be practical though. In this case you can mitigate the risks (certainly not eliminate them) by reducing the signal strength of your router. You can also shield your home so that your frequency leaks less. I have not done it, but strong rumour (researched) has it that even aluminum mesh (like fly screen) across the outside of your house with good grounding can make a huge difference to the amount of signal that will escape. But of course, bye-bye cell phone coverage.

On the protection front, another alternative may be to get your router (if it is capable of doing it, most are not, but I would imagine routers running openwrt and possibly tomato/dd-wrt can) to log all packets traversing your network and keeping an eye on it. Even just monitoring for anomalies with total bytes in and out of various interfaces could give you a good degree of protection.

At the end of the day, maybe the question to ask is “What do I need to do to make it not worth a casual hacker’s time to penetrate my network?” or “What is the real cost of having my network compromised?”, and going from there. There is no quick and easy answer.

接著是reirab的回答:

As others have said, SSID hiding is trivial to break. In fact, your network will show up by default in the Windows 8 network list even if it is not broadcasting its SSID. The network still broadcasts its presence via beacon frames either way; it just does not include the SSID in the beacon frame if that option is ticked. The SSID is trivial to obtain from existing network traffic.

MAC filtering is not terribly helpful either. It might briefly slow down the script kiddie that downloaded a WEP crack, but it is definitely not going to stop anyone that knows what they are doing, since they can just spoof a legitimate MAC address.

As far as WEP is concerned, it is completely broken. The strength of your password does not matter much here. If you are using WEP, anyone can download software that will break into your network pretty quickly, even if you have a strong password.

WPA is significantly more secure than WEP, but is still c***idered to be broken. If your hardware supports WPA but not WPA2, it is better than nothing, but a determined user can probably crack it with the right tools.

WPS (Wireless Protected Setup) is the bane of network security. Disable it regardless of what network encryption technology you are using.

WPA2, in particular the version of it that uses AES, is quite secure. If you have a descent password, your friend is not going to get into your WPA2 secured network without getting the password. Now, if the NSA is trying to get into your network, that is another matter. Then you should just turn off your wireless entirely. And probably your internet connection and all of your computers too. Given enough time and resources, WPA2 (and anything else) can be hacked, but it is likely going to require a lot more time and a lot more capabilities than your average hobbyist is going to have at their disposal.

As David said, the real question is not “Can this be hacked?”, but rather, “How long will it take someone with a particular set of capabilities to hack it?”. Obviously, the answer to that question varies greatly with respect to what that particular set of capabilities is. He is also absolutely correct that security should be done in layers. Stuff you care about should not be going over your network without being encrypted first. So, if someone does break into your wireless, they should not be able to get into anything meaningful aside from maybe using your internet connection. Any communication that needs to be secure should still use a strong encryption algorithm (like AES), possibly set up via TLS or some such PKI scheme. Make sure your e-mail and any other sensitive web traffic is encrypted and that you are not running any services (like file or printer sharing) on your computers without the proper authentication system in place.


有什麼要補充的解釋嗎?在評論中發出聲音。想從其他精通技術的Stack Exchange使用者那裡瞭解更多答案嗎?在這裡檢視完整的討論主題。

  • 發表於 2021-04-11 10:40
  • 閱讀 ( 36 )
  • 分類:網際網路

你可能感興趣的文章

10種方式你的路由器沒有你想象的那麼安全

... 雖然更改路由器的預設密碼很簡單,但大多數人不會這麼做。沒有自動“強制”密碼重置。基本上你需要登入到路由器的管理控制檯去做。絕大多數路由器所有者通常不會靠近這個控制檯。。。如果你是這些人...

  • 發佈於 2021-03-12 04:19
  • 閲讀 ( 40 )

你的樹莓皮安全嗎?

你的樹莓皮安全嗎?當然是。但它真的安全嗎?上面的資料安全嗎?這個計劃會被推翻嗎? ...

  • 發佈於 2021-03-13 03:37
  • 閲讀 ( 61 )

與wink hub一起使用的10種最佳ifttt配方

... 如果你是一個雞蛋愛好者,出人意料地跑出來是一個真正的創傷經歷。用這個食譜來確保你再也不會缺錢了。 ...

  • 發佈於 2021-03-14 04:14
  • 閲讀 ( 36 )

購買mesh wi-fi路由器套件的5個理由(以及不購買的3個理由)

...房子時,它必須抵抗牆壁(厚的和薄的),物體和地板。大多數時候,它都做不到。最後你在樓上的臥室裡看到零星的報道,詛咒YouTube,因為它一直在緩衝。Mesh-Wi-Fi系統希望結束這種恐怖。 ...

  • 發佈於 2021-03-15 04:47
  • 閲讀 ( 50 )

什麼在佔用我的頻寬?監視家庭網路使用的5個技巧

... 很多事情都會耗盡你的網際網路頻寬容量。大多數時候,你認識的人都是你人際網路中的人。有時,它是惡意軟體或網路入侵者。 ...

  • 發佈於 2021-03-18 05:41
  • 閲讀 ( 47 )

在路由器上設定來賓網路的5個原因

... 但是為什麼你真的需要在你的路由器上建立一個訪客網路呢?這五點應該能說服你。 ...

  • 發佈於 2021-03-18 15:21
  • 閲讀 ( 45 )

你真的能打破網際網路嗎?

...動,許多社交網路和新聞機構都在討論同一件事。”這是大多數人聽到這個短語時的想法。 ...

  • 發佈於 2021-03-18 15:24
  • 閲讀 ( 66 )

保持網上銀行賬戶安全的10個小貼士

... 大多數銀行都會提供啟用雙因素身份驗證(2FA)的選項。雖然2FA有它的優點和缺點,但它仍然可以為您的敏感帳戶資訊提供額外的保護。 ...

  • 發佈於 2021-03-20 20:08
  • 閲讀 ( 48 )

6款出色的android網路應用程式,用於監控、ping等

... 您可以遠端訪問共享網路的大多數裝置。但是對於安全通訊,SSH(代表secureshell)是最好的選擇。 ...

  • 發佈於 2021-03-22 17:15
  • 閲讀 ( 52 )

mesh wi-fi系統如何解決wi-fi問題

...確橋接。您可能需要使用桌面瀏覽器來實現這一點,因為大多數老式的網路硬體使用的是一個笨重的介面,對移動裝置不是特別友好。 ...

  • 發佈於 2021-03-24 18:02
  • 閲讀 ( 51 )
ta677463
ta677463

0 篇文章

作家榜

  1. admin 0 文章
  2. 孫小欽 0 文章
  3. JVhby0 0 文章
  4. fvpvzrr 0 文章
  5. 0sus8kksc 0 文章
  6. zsfn1903 0 文章
  7. w91395898 0 文章
  8. SuperQueen123 0 文章

相關推薦