How to Configure Wireless Cards In Linux

How to Configure Wireless Cards In Linux_image

Configuring the wireless card can be accomplished using Graphical mode described before during the GUI configuration of the Network card. In This case Select Wireless tab in the Network Connections Pop up box instead of selecting wired tab.

Click on the Add button from this tab, which will display a dialog box with title “Wireless connection 1”.This dialog box has four tabs Wireless, Wireless Security, IPv4 Settings and IPv6 Settings.

Connection Name

The default connection name is “Wireless connection 1”, followed by the number of the adapter being configured. This name can be changed according pentester that is more meaningful such as Victim 1 wireless connection

Connect Automatically Checkbox

If the “Connect Automatically” checkbox is selected, at the time of starting system, System will try to connect to the wireless network automatically. If the checkbox is not selected, it means pentester will need to enable the wireless adapter manually.

Wireless Tab

  1. Service Set Identifier (SSID)

The Service Set Identifier (SSID) is name in the network used to identify the wireless network. Every network have a single ESSID, and this name will be used by the clients to connect with the network. SSID is set for the AP (Access Point) and all computer must use that Service Set Identifier (SSID) to connect in the network

  1. Mode

There are two modes available to configure wireless card, one is ad hoc another infrastructure. Ad hoc networks used to make connection between computers without a central AP (Access Point) In these connections, each wireless connection must be configured same wireless setting of other computers to establish connection. In infrastructure mode the central Access Point is needed to manage all the wireless network. All clients must be configured to match the setting arrange by access point.

  1. Basic Service Set Identification

The Basic Service Set Identification is used to identify the MAC (Media Access Control) address of the Access Point. Each AP has unique BSSID.

  1. Device MAC Address

The field for the gadget MAC location is utilized to bolt this setup to a physical wireless adapter. This is helpful when a machine has more than one wireless adapter. The drop down for this field will be populated with the MAC address of wireless adapter dynamic. Essentially select the right MAC address for the connector you are configuring.

  1. Cloned MAC Address

Ordinarily the penetration tester won’t have any desire to utilize the real MAC address of the adapter that is, no doubt utilized on the computer. This may be carried out to sidestep basic security systems, for example, MAC address filtering where just computer with particular MAC address are permitted to join with the network.

  1. Maximum transmission unit (MTU)

The Maximum transmission unit (MTU) is a systems administration setting that is utilized to figure out how vast the systems administration bundles could be to correspond with the computer. As a rule, the MTU could be set to program and will work fine. In situations where provisions oblige a particular MTU, allude to that requisitions’ documentation to focus the MTU and set it around there.

WIRELESS SECURITY TAB

  1. Security Drop Down

The Security drop-down area is utilized to select the strategy for securing the wireless network. For especially ad hoc network, the system clients focus the right security settings, ensuring that each client’s security settings match each other computer in the network. In Infrastructure mode, every customer must be designed to match the security setting of the right to gain access point.

  1. Wired Equivalent Privacy

Wired Equivalent Privacy (WEP) is a older security system that uses basic encryption technology to give security identical to wired systems. WEP utilizes either a 10 or 26 hexadecimal key to secure the communication. The WEP encryption standard has security blemishes that will permit penetration tester to effectively break most WEP encryption keys.

  1. Lightweight Extensible Authentication Protocol

Lightweight Extensible Authentication Protocol (LEAP) was produced by Cisco Systems to give upgraded security over the less secure WEP

System. LEAP is like Dynamic WEP.

  1. WiFi Protected Access

Wifi Protected Access (WPA) is a right to access technology that improves security of wireless network utilizing temporal key integrity protocol (TKIP) and honesty checks. Systems utilizing WPA are a great deal stronger to ambushes than WEP-protected wireless network. The introductory WPA standard was upgraded with the arrival of WPA2 by utilizing a stronger security technique for encryption.

  1. Passwords And Keys

In the event that WEP or WPA individual were chosen as the security system from the drop down, sort the security enter in the password/key field. Check the Show password/key checkbox to check the key being utilized has been written effectively. In situations when the secret key ought not to be shown, leave the checkbox unchecked.

IPv4 Settings Tab

Once the information in Wireless and Wireless Security tabs has been finished, the Ipv4 arrangement could be finished.

Save

When the greater part of the obliged data has been given, spare the settings by clicking the Save button. After the settings have been saved, the machine will attempt to connect with the network.

If Appreciate My Work, You should consider:

Leave a Reply

Your email address will not be published. Required fields are marked *