WLAN security

Tracing

© Lead Image © Guillermo Del Olmo Pintado, 123RF.com

© Lead Image © Guillermo Del Olmo Pintado, 123RF.com

Author(s):

Almost every wireless LAN has some potential security weaknesses. The Wifislax Slackware derivative helps detect and eliminate them.

Even before the revelations by Edward Snowden, security in computer communications was a hot topic, and it's not just the spooks who are listening in: script kiddies, crackers, and war drivers can break into networks and do damage. Because WLANs are becoming increasingly popular, it's not just PCs that connect wirelessly to one other; printers, TVs, and mass storage are all integrated in a WLAN.

Although Linux it is widely viewed as a bulwark against such machinations, the free operating system cannot prevent vulnerabilities in existing industry standards. Therefore, you should take a detailed look at the security settings of your wireless network and shut down any vulnerabilities. The Wifislax [1] Live forensics distribution, which originates from Spain, reliably identifies weaknesses and helps you remove them.

First Start

The Wifislax ISO image [2], which weighs in at just 630MB, fits perfectly onto a CD. When launched, the system comes up with an unusual GRUB screen: You can then change the language setting to English in the first step and select whether to boot Wifislax with a conventional or PAE kernel. In a second splash screen, you can specify whether you prefer KDE SC or Xfce as your desktop environment.

[...]

Use Express-Checkout link below to read the full article (PDF).

Read full article as PDF:

Price $2.95

Related content

  • Security Lessons

    How to find, map, crack, and impersonate wireless networks.

  • KWiFiManager

    Connecting to wireless networks is

    more popular than ever. KDE’s KWiFi-

    Manager is a handy tool for monitoring

    and managing wireless connections.

  • Hotspotter

    Security experts are always concerned with WLAN access points, but they sometimes forget that the client is also open to attack. Public hotspots make it quite easy for attackers to hijack connections, as the Hotspotter tool demonstrates.

  • Ask Klaus!
  • Security and SOHO Routers

    Home and small office networks typically place their security in the hands of an inexpensive device that serves as a router, DHCP server, firewall, and wireless hotspot. How secure are these SOHO router devices? We're glad you asked …

comments powered by Disqus

Direct Download

Read full article as PDF:

Price $2.95

News