{"id":1532,"date":"2014-02-04T09:37:03","date_gmt":"2014-02-04T15:37:03","guid":{"rendered":"http:\/\/www.poweradmin.com\/blog\/?p=1532"},"modified":"2015-04-24T16:42:41","modified_gmt":"2015-04-24T21:42:41","slug":"is-your-wireless-network-vulnerable-to-packet-sniffers","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/is-your-wireless-network-vulnerable-to-packet-sniffers\/","title":{"rendered":"Is Your Wireless Network Vulnerable to Packet Sniffers?"},"content":{"rendered":"<p>\n\t<a href=\"\/blog\/wp-content\/uploads\/2014\/02\/Wireless-Network-Security-and-Safety.jpg\" rel=\"\" style=\"\" target=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" alt=\"Wireless Network Security and Safety\" class=\"alignleft size-medium wp-image-1567\" height=\"113\" src=\"\/blog\/wp-content\/uploads\/2014\/02\/Wireless-Network-Security-and-Safety-300x225.jpg\" style=\"margin-right: 20px;\" title=\"Wireless Network Security and Safety\" width=\"150\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/02\/Wireless-Network-Security-and-Safety-300x225.jpg 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/02\/Wireless-Network-Security-and-Safety.jpg 1000w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\"><\/a><span style=\"font-size:16px;\">Almost every company has a wireless network in effect to some extent. It\u00b4s a part of the modern workplace and keeps computers, printers and other devices talking to each other and working smoothly.<\/span>\n<\/p>\n<p>\n\t<span style=\"font-size:16px;\">Every wireless network is a potential entry point for determined hackers, though, who can hack your system from a nearby coffee shop, or your own car park. They don\u00b4t even need to come in to break in these days. Thanks to long-range aerials you might never even see them coming and the most well-equipped can work from the comfort of their own home.<\/span>\n<\/p>\n<h2>\n\t<strong><span style=\"font-size:18px;\"><span style=\"color: rgb(0, 204, 0);\">A Sniffer, But No Dog<\/span><\/span><\/strong><br>\n<\/h2>\n<p>\n\t<a href=\"\/blog\/wp-content\/uploads\/2014\/02\/Packet-Sniffers.jpg\" rel=\"\" style=\"\" target=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" alt=\"Packet Sniffers\" class=\"alignleft size-medium wp-image-1570\" height=\"199\" src=\"\/blog\/wp-content\/uploads\/2014\/02\/Packet-Sniffers-225x300.jpg\" style=\"margin-right: 20px; border: 1px solid black;\" title=\"Packet Sniffers\" width=\"150\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/02\/Packet-Sniffers-225x300.jpg 225w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/02\/Packet-Sniffers-768x1024.jpg 768w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/02\/Packet-Sniffers.jpg 1000w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\"><\/a><span style=\"font-size:16px;\">Malicious hackers often come armed with <a href=\"http:\/\/computer.howstuffworks.com\/workplace-surveillance2.htm\" target=\"_blank\" rel=\"nofollow\">packet sniffers<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>. That might sound like they\u00b4re turning up to the office with a dog in tow, and in a way they are, but don\u00b4t go looking for a furry friend. Instead packet sniffers are hardware or high-tech programs that intercept and log network traffic.<\/span>\n<\/p>\n<p>\n\t<span style=\"font-size:16px;\">Packet sniffers can be used for perfectly ethical reasons, like testing protocols and diagnosing network issues. Hackers also like to use them, though, and can intercept unencrypted data and take all kinds of information, including passwords and authentication tokens, that renders the whole process of security meaningless. Hackers also capture entire packets to use later in specific types of attacks such as spoofing, where hackers can send out thousands of emails from your system, and man-in-the-middle attacks.<\/span>\n<\/p>\n<h2>\n\t<span style=\"color:#00cc00;\"><span style=\"font-size: 18px;\"><strong>Encryption is Key<\/strong><\/span><\/span><br>\n<\/h2>\n<p>\n\t<a href=\"\/blog\/wp-content\/uploads\/2014\/02\/WPA2-Encryption.jpg\" rel=\"\" style=\"\" target=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" alt=\"WPA2 Encryption\" class=\"alignleft size-medium wp-image-1568\" height=\"143\" src=\"\/blog\/wp-content\/uploads\/2014\/02\/WPA2-Encryption-215x300.jpg\" style=\"margin-right: 20px;\" title=\"WPA2 Encryption\" width=\"102\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/02\/WPA2-Encryption-215x300.jpg 215w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/02\/WPA2-Encryption.jpg 600w\" sizes=\"auto, (max-width: 102px) 100vw, 102px\"><\/a><span style=\"font-size:16px;\">The best way to maintain the integrity of your network is to encrypt every piece of information that is transmitted across it with WPA\/WPA2 encryption on your network. This makes the packet sniffer and any number of attacks useless, because even if the hacker has the data he cannot read it. Secure File Transfer protocol and Secure Shell are just two fully secured means of transmitting data.<\/span>\n<\/p>\n<p>\n\t<span style=\"font-size:16px;\">This might not always be possible, but if your network is on WEP protection, then it is <a href=\"http:\/\/www.lifehacker.com.au\/2009\/07\/how-to-crack-a-wi-fi-networks-wep-password-with-backtrack\/\" rel=\"nofollow\" target=\"_blank\">time to upgrade<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> to WPA at the very least and WPA2 is highly recommended. WEP is just too easy to get around and YouTube is awash with videos showing even casual hackers how to break WEP in minutes. WPA is stronger, but still has some vulnerabilities, while WPA2, with the right length and type of password, is strong enough to survive most brute force attacks and renders packet sniffing useless.<\/span>\n<\/p>\n<h2>\n\t<span style=\"color:#00cc00;\"><strong><span style=\"font-size: 18px;\">Your Favorite Channel<\/span><\/strong><\/span><br>\n<\/h2>\n<p>\n\t<a href=\"\/blog\/wp-content\/uploads\/2014\/02\/Wireless-Channel-Capture.jpg\" rel=\"\" style=\"\" target=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" alt=\"Wireless Channel Capture\" class=\"alignleft size-medium wp-image-1566\" height=\"131\" src=\"\/blog\/wp-content\/uploads\/2014\/02\/Wireless-Channel-Capture-300x225.jpg\" style=\"\" title=\"Wireless Channel Capture\" width=\"176\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/02\/Wireless-Channel-Capture-300x225.jpg 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/02\/Wireless-Channel-Capture.jpg 1000w\" sizes=\"auto, (max-width: 176px) 100vw, 176px\"><\/a><span style=\"font-size:16px;\">Packet sniffers can generally capture one channel at a time, unless you\u00b4re dealing with seriously sophisticated hackers with multiple wireless interfaces and the ability to capture multiple channels.<\/span>\n<\/p>\n<p>\n\t<span style=\"font-size:16px;\">The packet sniffing software, which can be any number of open-source options or kits that can be purchased on the \u2018black market\u2019, captures the raw packet of data, which is a conversation between two nodes on the network, and then analyzes it. This is useful for IT engineers working on their own network as they can find out where a problem lies and which node isn\u00b4t responding to a network request. Of course they can be used for nefarious purposes too.<\/span>\n<\/p>\n<p>\n\t<span style=\"font-size:16px;\">Hackers can see the websites you\u00b4re visiting, albeit the non-secure ones, and files, passwords and all manner of other data.<\/span>\n<\/p>\n<h2>\n\t<span style=\"color:#00cc00;\"><span style=\"font-size: 18px;\"><strong>Countermeasures<\/strong><\/span><\/span><br>\n<\/h2>\n<p>\n\t<a href=\"\/blog\/wp-content\/uploads\/2014\/02\/Anti-Packet-Sniffing-Tools.jpg\" rel=\"\" style=\"\" target=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" alt=\"Anti-Packet Sniffing Tools\" class=\"alignleft size-medium wp-image-1569\" height=\"87\" src=\"\/blog\/wp-content\/uploads\/2014\/02\/Anti-Packet-Sniffing-Tools-300x175.jpg\" style=\"margin-right: 10px;\" title=\"Anti-Packet Sniffing Tools\" width=\"150\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/02\/Anti-Packet-Sniffing-Tools-300x175.jpg 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/02\/Anti-Packet-Sniffing-Tools.jpg 1000w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\"><\/a><span style=\"font-size:16px;\">If you want to check your own network for a packet sniffer then you can use an anti-packet sniffing tool. These detect \u00b4promiscuous\u00b4 networks that have been set up for sniffing packets of data and compromising your network\u00b4s security. That will only work if the computer in question is in the vicinity at the time, though, and won\u2019t strictly protect you from anything.<\/span>\n<\/p>\n<p>\n\t<span style=\"font-size:16px;\">Security is a vital part of any network, but especially a wireless one which can be more easily accessed than a wired. Even if your company only uses a wireless network for visitors, it still needs to be protected to ensure that your visitor data is also safe.<\/span>\n<\/p>\n<p>\n\t<span style=\"font-size:16px;\">Hacking tools available on the internet are cheap and easy-to-use these days and as a quick look at any news channel will often tell you, network intrusions can happen to even the largest organizations. This means that it pays never to be complacent about network security, especially if you store sensitive customer data such as credit card details.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Almost every company has a wireless network in effect to some extent. It\u00b4s a part of the modern workplace and keeps computers, printers and other devices talking to each other and working smoothly. Every wireless network is a potential entry point for determined hackers, though, who can hack your system from a nearby coffee shop, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1567,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,13,9,8],"tags":[],"class_list":["post-1532","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it","category-pc-security","category-technical","category-windows"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/1532","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=1532"}],"version-history":[{"count":5,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/1532\/revisions"}],"predecessor-version":[{"id":3536,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/1532\/revisions\/3536"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/1567"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=1532"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=1532"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=1532"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}