MAC address filtering is often used to secure older wireless equipment. Is this technique effective? In this IT Dojo video, Bill Detwiler shows you just how easy it is to spoof a MAC address and why MAC address filtering might not even keep out the "slacker hackers."
When you support small offices, home offices, and remote offices, you often run across older wireless equipment. Equipment that's likely secured with MAC filtering and perhaps a hidden SSID and WEP encryption.
I think most techs would agree that MAC filtering alone isn't going to secure a wireless network and that even WEP and a hidden SSID aren't much better. But, does MAC filtering at least keep out the lazy hackers? In this IT Dojo video, I show you just how easy it is to spoof a MAC address.
After watching the video, you can read the original tip in Chad Perrin's article, "How to spoof a MAC address". For more wireless security tips, check out the following TechRepublic Resources:
- Tips for small businesses who don't want to skip security
- Wi-Fi thief's tale reminds IT to enforce home office security
- 10 technologies that cybercriminals love to exploit
- 10 things you should know about securing wireless connections
- 10 Wi-Fi security tips for road warriors
- 10 ways to prepare for a wireless rollout
- 10 things you should do to protect your network against wireless devices
- A secure wireless LAN hotspot for anonymous users
- Why VPN can't replace Wi-Fi security
- Debrief and Defend: Why our organization should not deploy wireless
- Debrief and Defend: Wired vs. wireless LANs
- TechRepublic's ultimate guide to enterprise wireless LAN security
- Secure your Bluetooth wireless networks and protect your data
- TechRepublic's Wireless Communications Policy
- Wireless Networking Survival Guide
- Strengthen your wireless security by avoiding these missteps