Bullet-Proofing Your Wireless Router By Steve Janss
Copyright Jansys Information Systems - All rights reserved Bullet-Proofing Your Wireless Router How to tweak your wireless router to obtain maximum protection
Copyright Jansys Information Systems - All rights reserved But First! A quick example of one of the many thousands of stupid things one can do on a computer…
Copyright Jansys Information Systems - All rights reserved Overview Before you start… Firewall basics Physical installation Firmware upgrades Tweaking your router’s settings
Copyright Jansys Information Systems - All rights reserved Before you start… Update Windows Update Office Update Antivirus –Live Update –Default settings –Full system scan Run Ad-Aware: Run Spybot: Require ctrl-alt-del to log on
Copyright Jansys Information Systems - All rights reserved Microsoft Updates Open Internet Explorer Help, Online Support Downloads and Updates Microsoft Windows Updates Microsoft Office Updates Automatic Updates
Copyright Jansys Information Systems - All rights reserved CTRL-ALT-DEL Start Control Panel User Accounts Change the way users log on or off
Copyright Jansys Information Systems - All rights reserved
Firewall Basics Linksys WRT54G –Wireless Router with a built-in firewall NAT – Network Address Translation –Separates internal and external network traffic –Hackable – requires internal client (trojan) Access Restrictions –IP address –MAC address WPA Shared Key
Copyright Jansys Information Systems - All rights reserved NAT Network Address Translation –Separates internal and external network traffic –Hackable – requires internal client (trojan)
Copyright Jansys Information Systems - All rights reserved Physical Installation Install, upgrade, and configure router first! Do not connect router to Internet until completely configured Install, update, and configure NIC last Instructions! –Quite good… –Ensures correct order (drivers vs hardware vs Windows Auto Detect)
Copyright Jansys Information Systems - All rights reserved Firmware Software for “edge devices” like hubs, switches, routers, etc.
Copyright Jansys Information Systems - All rights reserved
Firmware Files
Copyright Jansys Information Systems - All rights reserved
The Password Is… admin Please give your friendly neighborhood hackers a hard time by changing it! Use the same strong password rules enforced at work
Copyright Jansys Information Systems - All rights reserved
Accessing The Router
Copyright Jansys Information Systems - All rights reserved
Summary Available on the Seoul CC website It’s really not that complicated… You can easily undo your mistakes So what’re you waiting for?
Questions? Thank you for coming!