/pine
Super Star Member
- Joined
- Mar 4, 2009
- Messages
- 12,450
a moot point since it's not a viable security mechanism for the home users
something the "home use" can easily use is a program called "SNORT" (Google it)
Snort is fully configurable via the snort.conf file generally located in the /etc folder. To see what kind of wireless threats this IDS can detect, it is best to just review the various options of this file. The following breaks down the main detection categories.
Rouge AP: Detects any access point that is not designated in it the list of authorized devices.
AntiStumbler: Detects the use of a NetStumbler like program by detecting numerous probes/responses that these programs generate.
DeauthFlood: Detects attempts to kick users offline via deauthentication packets.
AuthFlood: Detects attempts to kick an access point offline via an authentication packet flood.
MAC Spoof: Detects attempts by an attacker to spoof their MAC address for unauthorized access to a wireless network.
Like I pointed out earlier in the thread...most cracking software uses a script that disconnects existing connections so a second script can detect the credentials of legitmate users...monitoring the interuptions is the key to preventing intrusions...