Forums before death by AOL, social media and spammers... "We can't have nice things"
|    alt.internet.wireless    |    Fun with wireless Internet access    |    55,960 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 55,605 of 55,960    |
|    Marian to Frank Slootweg    |
|    Re: OT? Can my neiighbor, whose wifi I'm    |
|    28 Nov 25 17:51:32    |
      XPost: alt.comp.os.windows-11, alt.comp.os.windows-10       From: marian@dumbshits.com              On 28 Nov 2025 15:12:22 GMT, Frank Slootweg wrote:              > There are two passwords: 1) The one to access the web UI of the       > modem/router and 2) the password for your WiFi network.       >       > 1) probably should be unique, but must not be unique, because it's       > only accessed from your (hardwired or/and wireless) network.       >       > 2) is unique as shipped from / installed by the ISP, but as soon as       > you change the SSID (your WiFi network name) it can be anything you       > like, provided it matches the rules defined by the router and is       > sufficiently secure.              I'm sure almost everyone knows the two credentials, but I'm not sure if the       OP is aware of the differences between them...              1. The admin "password" to the router is sometimes (often?) limited        to 8 characters (at least it is on some of my older Netgear routers)        and it may require uppercase,lowercase & funky characters (as my        Netgear routers require), so you're limited in your choices.              2. The SSID "passphrase" to the access point, can be 8?63 characters        for WPA2/WPA3, which can be resistant to brute-force attacks.              I suspect most people aren't aware of oublic rainblow hash tables, which       take advantage of the fact that WPA2 uses PBKDF2 (Password-Based Key       Derivation Function 2) with HMAC-SHA1 to stretch the passphrase into a       256-bit key. Butterfly hash tables also exist, which are a specialized       structure that optimizes lookup and reduces memory usage compared to       traditional rainbow tables.              They're only effective if the attacker can guess the SSID, because the SSID       is part of the salt in WPA2 key derivation. That's why you want your SSID       not to show up in a dictionary lookup, as then you have no AP security.              WPA3's SAE (Simultaneous Authentication of Equals) protocol makes those       tables obsolete, but for most of us, what all this means is we should       simply choose an SSID that isn't found in typical dictionary lookup tables.              Something like "gibberis_plus_more_gibberish_optout_nomap" for example.              --- SoupGate-Win32 v1.05        * Origin: you cannot sedate... all the things you hate (1:229/2)    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca