Author Topic: Reverse engineering a wireless signal?  (Read 3654 times)

0 Members and 1 Guest are viewing this topic.

Offline DerpyTurtle

  • Peasant
  • *
  • Posts: 80
  • Cookies: -12
    • View Profile
Reverse engineering a wireless signal?
« on: March 24, 2013, 02:17:45 am »
I was wondering if anyone had found a way to reverse engineer a wireless adapter to scramble the signal so nobody could see your network or see what you are up to. If so, is there any specific adapter that seems to work best?

Offline Kulverstukas

  • Administrator
  • Zeus
  • *
  • Posts: 6627
  • Cookies: 542
  • Fascist dictator
    • View Profile
    • My blog
Re: Reverse engineering a wireless signal?
« Reply #1 on: March 24, 2013, 08:41:57 am »
I believe you don't need to reverse engineer anything. Wireless can be hidden with settings in your router. More precisely the SSID would be hidden.

Now you said "wireless adapter" to create a network? Well "wireless adapter" AFAIK is for connecting to the network, is it no? unless you want to create an Ad-Hoc network, which you should have mentioned. In that case you can also hide the SSID within settings.

Maybe RBA could extend on this some more :)

Offline WirelessDesert

  • Knight
  • **
  • Posts: 356
  • Cookies: 10
  • I think...
    • View Profile
Re: Reverse engineering a wireless signal?
« Reply #2 on: March 24, 2013, 08:57:21 am »
As I know it, I think that all hidden networks are visible if you know what to do.This is if they are in the same spektrum ofc. Hiding it in the regular settings will just make it nameless and also (I think), set a boolean to true. But idk really.

But I've been able to connect to hidden networks I didn't know about with my iPod.
Check out my arduino project: Moving car - School project!
"I'm like current, I always take the easiest route."

Offline proxx

  • Avatarception
  • Global Moderator
  • Titan
  • *
  • Posts: 2803
  • Cookies: 256
  • ФФФ
    • View Profile
Re: Reverse engineering a wireless signal?
« Reply #3 on: March 24, 2013, 10:14:21 am »
I believe you don't need to reverse engineer anything. Wireless can be hidden with settings in your router. More precisely the SSID would be hidden.

Now you said "wireless adapter" to create a network? Well "wireless adapter" AFAIK is for connecting to the network, is it no? unless you want to create an Ad-Hoc network, which you should have mentioned. In that case you can also hide the SSID within settings.

Maybe RBA could extend on this some more :)

Hiding SSID's is a complete joke.
There is nothing hidden about it.
During association the SSID is needed because its used in the hash along with passphrase,MAC address and a couple other things.
In the case of WPA and WPA2 at least.

In fact one could send a deauth to the client which forces it to reconnect , sniffing that traffic will give you the SSID.
If it doesnt use encryption at all the traffic can be sniffed in plain text.
« Last Edit: March 24, 2013, 10:14:51 am by proxx »
Wtf where you thinking with that signature? - Phage.
This was another little experiment *evillaughter - Proxx.
Evilception... - Phage

Offline Snayler

  • Baron
  • ****
  • Posts: 812
  • Cookies: 135
    • View Profile
Re: Reverse engineering a wireless signal?
« Reply #4 on: March 24, 2013, 10:21:48 am »
^^ What proxx said. Hiding SSID and MAC filtering are 2 security measures that are way easy to bypass. In wireless, one of the best ways of hiding a signal is using channel 14. It is only used on Japan, AFAIK, and no American/European device should be able to pick it up without tweaking the default settings. But using those frequencies is illegal, so use it at your own risk.

On linux:
Code: [Select]
iw reg set JPto enable channel 14.
« Last Edit: March 24, 2013, 10:24:53 am by Snayler »

Offline Axon

  • VIP
  • King
  • *
  • Posts: 2047
  • Cookies: 319
    • View Profile
Re: Reverse engineering a wireless signal?
« Reply #5 on: March 24, 2013, 12:08:48 pm »
Hiding your ssid isn't efficient as you might think, best way to protect your network from bieng hacked is to use a very strong password.

Offline Daemon

  • VIP
  • Baron
  • *
  • Posts: 845
  • Cookies: 153
  • A wise man fears a gentle mans anger
    • View Profile
Re: Reverse engineering a wireless signal?
« Reply #6 on: April 11, 2013, 07:56:51 am »
Hiding your ssid isn't efficient as you might think, best way to protect your network from bieng hacked is to use a very strong password.

Very true, as using  a tool like Kismet with a wifi card that supports injection will find even the networks that aren't broadcasting their SSID. Disabling that might get rid of skiddies attacking it, but it's security through obscurity which is obscure in its effect at best (horrible, i know :D )

As for RE a signal...like kulverstukas said you don't have to RE anything if it's being broadcasted in cleartext, in that case anyone listening will see any and everything that goes over it. So to counterbalance that, we use encryption to make it so that people can't (easily anyways) read whats contained in those packets, though encryption can be broken. Like Axon said, the best protection is a very strong password. Though another part of good security is adjusting the strength of your router and its location/placement so that it doesn't broadcast past the walls of your house/business or perhaps the yard if you want it there. This means attackers would have to get physically close enough to access it (or a damn good antennae) which will deter even more of them. Combine this with a strong password (think 16+ chars, 32 is a good number) and WPA2 as your encryption scheme, and you'll be doing very good for security bro. GL
This lifestyle is strictly DIY or GTFO - lucid

Because sexploits are for h0edays - noncetonic


Xires burns the souls of HF skids as a power supply

Offline Stackprotector

  • Administrator
  • Titan
  • *
  • Posts: 2515
  • Cookies: 205
    • View Profile
Re: Reverse engineering a wireless signal?
« Reply #7 on: April 28, 2013, 02:10:16 pm »
Very true, as using  a tool like Kismet with a wifi card that supports injection will find even the networks that aren't broadcasting their SSID. Disabling that might get rid of skiddies attacking it, but it's security through obscurity which is obscure in its effect at best (horrible, i know :D )

As for RE a signal...like kulverstukas said you don't have to RE anything if it's being broadcasted in cleartext, in that case anyone listening will see any and everything that goes over it. So to counterbalance that, we use encryption to make it so that people can't (easily anyways) read whats contained in those packets, though encryption can be broken. Like Axon said, the best protection is a very strong password. Though another part of good security is adjusting the strength of your router and its location/placement so that it doesn't broadcast past the walls of your house/business or perhaps the yard if you want it there. This means attackers would have to get physically close enough to access it (or a damn good antennae) which will deter even more of them. Combine this with a strong password (think 16+ chars, 32 is a good number) and WPA2 as your encryption scheme, and you'll be doing very good for security bro. GL
Also get rid of WPS systems. And instead take for example a good passphrase if you don't want to hassle with stupid long passwords for your friends and family.
~Factionwars