Like every other website on the planet, SmallNetBuilder uses cookies. Our cookies track login status, but we only allow admins to log in anyway, so those don't apply to you. Any other cookies you pick up during your visit come from advertisers, which we don't control.
If you continue to use the site, you agree to tolerate our use of cookies. Thank you!

Router Charts

Click for Router Charts

Router Ranker

Click for Router Ranker

NAS Charts

Click for NAS Charts

NAS Ranker

Click for NAS Ranker

More Tools

Click for More Tools

Wireless Features

Countermeasures & Conclusion

So what can you do to prevent hackers from getting into your network? Special Agent Bickers and his team have some tips for wireless users. He stresses that these are mainly for home users and should not be considered as official FBI best practices for businesses.

1) Network segregation

Put your access point on a separate subnet, with a firewall separating the wireless and internal users

2) Change the default settings on your access point

Default settings (SSID, administrator password, channel) are well known and even included as part of some WLAN attack tools

3) Use WPA with a strong key

WPA is a definite improvement over WEP in providing wireless security. But the version intended for home and SOHO use - WPA-PSK - has a weakness shared by any passphrase security mechanism. The choice of simple, common and short passphrases may allow your WPA-protected WLAN to be quickly compromised via dictionary attack (more info here).

4) Update your firmware

This is helpful if your AP or client doesn't currently support WPA. Many manufacturers have newer firmware for 802.11g products that add WPA support. You may also find this for 802.11b gear, but it's not as common. Check anyway!

5) Turn off the WLAN when not in use

A $5 lamp timer from your local hardware store is a simple, but effective way to keep your WLAN or LAN from harm while you're sleeping.

Bickers also said that if you have an access point that can swap keys fast enough, you may be able to stay ahead of an attacker. "Most likely they will get bored and attack someone else." But for most WLAN owners, this method isn't practical.

The FBI demonstrated this attack to the computer security professionals at the ISSA meeting in order to show the inadequate protection offered by WEP. It is one thing to read stories of WEP being broken in minutes, but it is shocking to see the attack done right before your eyes. It was fast and simple.

Thankfully, the FBI are the good guys.

More Wireless

Wi-Fi System Tools
Check out our Wi-Fi System Charts, Ranker and Finder!

Support Us!

If you like what we do and want to thank us, just buy something on Amazon. We'll get a small commission on anything you buy. Thanks!

Over In The Forums

posting here because in all my days of wireless networking ive never seen something like this.im running a lenovo T440P running MacOS Catalina 10.15.7...
My ac-68w still runs ancient asus fw version 3.0.0.4.374. I've read threads indicating that i have to first upgrade to intermediate versions before ge...
Update 2020/10/22 (9.0.0.4.386.40577)386 rc2-7 - Google Drive drive.google.com This version includes 18 models:ZenWiFi: XT8(RT-AX95Q), XD4(R...
I'm currently enjoying pretty fast internet (over 500Mbps) and I have a router that should be able to run a VPN client pretty well. I'm wondering if a...
as discused in this thread f the normal snmpd crashed on the RT-AX88U.So i tryed the mini-snmp package from entware, wich runs totally fine. Just want...

Don't Miss These

  • 1
  • 2
  • 3