Community discussions

MikroTik App
 
majidstg77
just joined
Topic Author
Posts: 1
Joined: Tue Apr 09, 2024 9:14 am

Defending brute force attack in access points

Tue Apr 09, 2024 9:35 am

Hi
i'm using cap gi-5haxd2haxd .It's not possible for me to use mac access list or hide ssid. What is the solution to defending against attackers that try to connect wireless by brute force attack?
Is it possible to block attackers by firewall filter rules ?
Last edited by majidstg77 on Tue Apr 09, 2024 9:49 am, edited 1 time in total.
 
User avatar
normis
MikroTik Support
MikroTik Support
Posts: 26393
Joined: Fri May 28, 2004 11:04 am
Location: Riga, Latvia

Re: Defending brute force attack in access points

Tue Apr 09, 2024 9:39 am

Use WPA3 and you will be safe against this. Your device supports it. Just know, that old devices will not be able to connect anymore, but you can't have two things at once - compatibility with old insecure clients, and also security.
 
User avatar
Nullcaller
Member Candidate
Member Candidate
Posts: 123
Joined: Mon Oct 16, 2023 3:09 pm

Re: Defending brute force attack in access points

Tue Apr 09, 2024 4:26 pm

What is the solution to defending against attackers that try to connect wireless by brute force attack?

If they're using the same MAC on every attempt, you can write a simple script that analyzes log files and adds the offending mac address to the access list, based on the number of tries in recent X minutes.

If they're using randomized MACs, God help you.

Who is online

Users browsing this forum: Ahrefs [Bot], Jaja2000 and 7 guests