Posted October 25, 2020
teceem: Disabling SSID and MAC filtering is on top of WPA2+good/pass.
WPA2 isn't perfect, but I can't imagine that anyone with the know-how to circumvent it is going for random users just for the free internet or sniffing around their files.
The fact that you can play as a "script-kiddy" and just download a piece of software on any platform and just scan I'd say it's pretty easy, even if they don't know the inner workings of such. WPA2 isn't perfect, but I can't imagine that anyone with the know-how to circumvent it is going for random users just for the free internet or sniffing around their files.
But no, SSID was never made and is not meant to be hidden or even encrypted. The 802.11 wireless spec requires access points to broadcast their SSID openly and while some companies implemented methods of "hiding it", it's like hiding a massive pink elephant in a forest. Softwares like InSSIDer, airodump-ng, NetStumbler, Kismet etc can find it in a couple of seconds and it doesn't matter if you set to the AP to hide it, or use WEP or WPA2. It's a total myth that needs to be killed off sooner rather than later. The only thing it does is to make if WORSE for those who actually need access to the network as they need to manually enter everything by hand, which is far more time-consuming than sniffing it off open signals.
It's like DRM - it hurts those with legal access the most.
Not to mention, clients will periodically leak the SSID of the hidden network even if the network isn't around.
"Introduction - Why Non-broadcast Networks are not a Security Feature"
[url=https://docs.microsoft.com/en-us/previous-versions/tn-archive/bb726942(v=technet.10)?redirectedfrom=MSDN#EDAA]https://docs.microsoft.com/en-us/previous-versions/tn-archive/bb726942(v=technet.10)?redirectedfrom=MSDN#EDAA[/url]
And as far as I remember, the old IEEE 802.11 doesn't encrypt L2 datagram headers, as in MAC.addresses, so only the data are both encrypted and authenticated. In any case, MAC filtering is used for legitimate administration reasons inside a network with f.ex VLANs or to use a timed-whitelist etc.
If you want to do it then by all means do it, but don't say it's an added security measure because it isn't, and adds more hassle than it's worth it
Again, best measure to prevent unauthorized access is a simple as having a long password/passphrase with WPA2+ and regularly change it, deny WLAN and WAN access to router, updated router etc.
If you have a 10 million dollars secret on your computer - for christ sake, plug it off the Internet :D
Post edited October 25, 2020 by sanscript