Results 11 to 17 of 17
Thread: Modem security
-
12-16-12, 01:15 AM #11
Re: Modem security
Depends on the amount of wireless traffic over that particular protocol. The more traffic the more packets it has to get the pieces of the password it needs. It does take quite awhile and is the best protocol out for residential routers. Unless you are being specifically targeted, you are looked over for easier prey.
WEP is laughable. It can be done in minutes. Even having MAC address filtering on doesn't do much for the number of MAC spoofers that are out.
-
12-16-12, 01:21 AM #12
Re: Modem security
Yup, it can be that fast. I try to tell everyone to use phrase passwords. If you use something out of dictionary, it can be broken in seconds. That goes for any password.
I could go on and on about security stuff. The stuff that is out right now is down right crazy. If you are using a public WiFi that isn't using encryption or certificates of some sort, you are asking for trouble.Alundil liked this post
-
- Join Date
- 07-24-06
- Location
- Colorado
- Posts
- 5,025
- Post Thanks / Like
- Blog Entries
- 6
-
12-16-12, 04:40 AM #14Re: Modem security
Even then...if somebody really wants the info, it's pretty hard to stop it without multiple levels of encryption. Physical medium is always susceptible if the attacker has enough money. NSA has had known fiber taps as far back as 2000. I've heard rumors they have one that doesn't even require a physical splice.
-
12-17-12, 11:42 AM #15
Re: Modem security
Update: New 25 GPU Monster Devours Passwords In Seconds | The Security Ledger
Case in Point
...a cluster of five, 4U servers equipped with 25 AMD Radeon GPUs and communicating at 10 Gbps and 20 Gbps over Infiniband switched fabric.
Gosney’s system elevates password cracking to the next level, and effectively renders even the strongest passwords protected with weaker encryption algorithms, like Microsoft’s LM and NTLM, obsolete.
In a test, the researcher’s system was able to churn through 348 billion NTLM password hashes per second. That renders even the most secure password vulnerable to compute-intensive brute force and wordlist (or dictionary) attacks. A 14 character Windows XP password hashed using LM, for example, would fall in just six minutes...
-
-
Thread Information
Users Browsing this Thread
There are currently 1 users browsing this thread. (0 members and 1 guests)
Bookmarks