AirTraf 802.11b Security Package 153
An anonymous reader writes "Being ignorant of network vulnerabilities is a happy condition for only so long. Ignorance is bliss, right up until someone with rogue access drives away with your company secrets. This article covers information about AirTraf, an open source package, which performs a number of tasks, such as determining the Service Set Identifier of the access points, and the channel it is operating under. It can tell how many wireless nodes are connected to a given access point, as well as that point's total load. AirTraf is capable, too, of polling a number of sniffers through a central polling server in order to collect the most current information. The least of your fears should be the leeching of your Internet connectivity. Industrial espionage is a growing reality that you must confront."
Site Surveys (Score:4, Insightful)
The problem with site surveys is that you have to load expensive software onto a laptop or handheld computer, and go wandering the halls looking for rogue bases, rogue access, and other violations of good security practices. The wandering minstrel who's singing the song of good security must be in the right place at the right time. Invariably, this is a hit-or-miss process, great for finding good places to mount access points, but horrible at making a hit on a security violation. You'd have to traipse the halls and haunt the parking lots, lurking... waiting... like a creepy stalker, trying to find anything out of the ordinary; and you'd still be unable to be in all places at once.
Sounds like a great security tool... (Score:3, Interesting)
Oh well...if the claims are correct, it will all be irrelevant when WPA releases later in the summer.
triangulation (Score:5, Interesting)
Re:triangulation (Score:5, Informative)
Re:triangulation (Score:2)
Well, obviously, you can triangulate 802.11 clients but I don't think that is what the poster was asking. Rather, I think he/she was asking: What software exists to do triangulation?
The major problem I see with triangulation is walls and other interfering objects. In an open field, triangulation should be relatively simple because the signal-to-distance curve should be fairly smooth as you move around. Throw some walls in, however, and you either need many more access points or some way of accounting
Who the hell modded that up? (Score:2)
Interesting results, but completely offtopic and noninformative regarding the original question.
It is possible to triangulate access points, although most software I've seen to do it uses signal strength interpolation instead of triangulation. Kismet - http://www.kismetwireless.net/ is able to do this
Re:triangulation (Score:2)
Re:triangulation (Score:1)
Re:triangulation (Score:2)
Generally triangulation works by having three receivers in a triangle surrounding the transmitter, calculating the signal strength of the received signal at each station, and from this information you can determine the location of the transmitter with some trigonometry.
In your typical 802.11[a
Re:triangulation (Score:2)
Triangulation isn't needed. Just look for the park bench with all the geeks with laptops on it. Simple....
Re:triangulation (Score:3, Interesting)
It's technically possible to combine simple RDF (using phase descriminators) with a base station to get a directional vector. Two RDF equipped bases would give you a point rather than a line, so it should also be possible to location limit access. Not that I've
AirTraf download (Score:1)
HTH, HAND.
Re:AirTraf download (Score:2)
Re:AirTraf download (Score:2)
Thanks, much appreciated!
Wireless security (Score:5, Insightful)
Re:Wireless security (Score:4, Informative)
Re:Wireless security (Score:1)
WEP was borked by design... (Score:3, Interesting)
In reality, you want to firewall off the AP and then use SSL to tunnel through it as you suggest. If they had built something better into the spec like IPsec (as good as SSL, but implemented deeper in the protocol stack), it would have been
Re:WEP was borked by design... (Score:2)
You make it sound like I could drive by your house, sense that you have an WAP, and crack your WEP with out stopping. In reality, thousands of weak packets are required in order to break a WEP key. That can take from several hours to many days to break. Chances are, no one is going to sit in your driveway for 36 hours for some free internet.
Re:WEP was borked by design... (Score:2)
I have heard about custom programs that are able to brute force a key from a single packet (weak or otherwise) from what I hear. Something about the fact that the IV key is only 24bit and how real time breaking of WEP isn't really that unpractical.
40bit ssl is easy to break, why shouldn't 24bit IV keys be?
I wouldn't sit in your driveway for 36 hours, but I bet someone would use the above stuff to go back to your house when they need net access near by.
Re:WEP was borked by design... (Score:2)
http://www.computerworld.com/mobiletopics/
Re:WEP was borked by design... (Score:2)
The things is that we are not talking about a normal WAN link which tries to be economical with the packets. All it takes is, for example, a live news feed and there will be lots of packets going over the link.
As for distamce, a normal AP can easily
Re:WEP was borked by design... (Score:1)
Re:WEP was borked by design... (Score:2)
Even with https, if I can attack your machine, the https security isn't worth anything. For example, SSL establishes a random session key. The random number generator could be 'randomly' generating the value 1, in which case the SSL session can always be broken. If your machine is well protected, that wouldn't be possible. However we are talking here about a PC with a wireless LAN adapter directly connected
Re:WEP was borked by design... (Score:1)
I think not-
You must mean SSH?
Or even better, IPSEC?
Any VPN product can be used over wireless to secure the wireless portion.
As another poster said- the only sane way to use wireless is to treat it as an entirely seperate, untrusted public network.
It's really just as simple as that.
Re:WEP was borked by design... (Score:2, Insightful)
One thing often overlooked is the overhead in using these encryption schemes. If you want an access point to handle a hundred clients you need to take the load into account. These APs are designed to run w/ little heat and power usage, not to mention the small clients such as PDAs and scanners.
Re:WEP was borked by design... (Score:2)
I agree that VPN tunneling is also a solution but again it either means extra hardware and/or some complicated configuration (at least more complicated than the average user can cope with). I see a lot of ADSL or broadband routers with a builtin AP that is being sold to SOHOs and domestic users, to avoid unsight
Vendors should get their act together (Score:2)
Or better yet why aren't vendors doing this on their APs? All these companies are targeting the home market, they should make things *gasp* easy.
Sure there are standards to consider, but considering what a mess WEP is its surprising to see that there's no big movement (or is there?) to repair it. Sure Cisco's method of filtering out weak IV packets is nice, but is anyone else going to pay to use their patents?
I'm expecting, or perhaps hoping, that by
Network Security (Score:5, Insightful)
If anyone knows of any agencies progressive enough to jump on the wireless bandwagon, pipe up. Otherwise I think it's just another victim of the hype monster.
Re:Network Security (Score:2)
Its a very very simple equation (Score:2, Informative)
Wireless 802.11(a,b,g) = unsecure
I have cracked 'secure' wep's in a matter of hours, and the more traffic going over the network, the easier it is. All you need is about a gig of traffic, and blamo, wep key in shining black letters right in front of you. I'm sorry guys, beaming a signal through the air is not secure (as shown by the amazing security from the satelite TV companies, I think we have all had a h card at some point, or other varients)
The only problem I have ever had with
Re:Its a very very simple equation (Score:5, Interesting)
Then use VPN to give your own staff access to the network, with the same security level you require for access from the public Internet.
WEP is not useful for anything than discouraging the casual bandwidth leech, if that matters to you at all.
Re:Its a very very simple equation (Score:5, Interesting)
Re:Its a very very simple equation (Score:2)
It's a similar deal with wireless LANs. If some luser comes on to your unencrypted network and uses it to deface microsoft.com, it's going to be very hard to show that you were
Re:Its a very very simple equation (Score:2)
The basic problem is that the US system has absolved people of responsibility for their own actions. If I don't wear my seatbelt, do I hurt other people? If I drink and drive, is it the bartender's fault, or mine? Under this system, it's both. So
Re:Its a very very simple equation (Score:5, Informative)
Re:Its a very very simple equation (Score:2)
Re:Its a very very simple equation (Score:5, Insightful)
I have cracked 'secure' wep's in a matter of hours, and the more traffic going over the network, the easier it is.
It is well-known that WEP is insecure but that doesn't mean that it is impossible to send secure data over the air. It is absolutely not the case that "wires=security". If you need to transmit crucial passwords over your corporate intranet you might be smarter to encrypt than rely on the fact that nobody with access to your physical network wants to steal your data. Encryption is the key to security, not broadcast medium.
The only problem I have ever had with wired lines is bad planning. Providing you know where your workstations are going to go, and how you plan on growing, wires are just fine and MUCH faster!! :)
So you need a network drop anywhere anyone may ever want to work on their laptop (or palmtop, or wi-fi phone). Sure, if you are going to be restrictive it is easy to force people to work in the places you tell them they should work. But this can hurt productivity. Knowledge workers will have persistent wi-fi in their homes, in cafes, in restaurants (even McDonald's), in hotels, and in trains, but you're going to tell them they have to deal with wires at the office? Sorry dude, I can't help but think that you are short-sighted and will be proved so over the next few years. Wireless with true encryption will be standard almost everywhere people work.
Re:Its a very very simple equation (Score:2)
If I overflow your switch, your fucked
Re:Its a very very simple equation (Score:3, Informative)
Re:Its a very very simple equation (Score:1)
Wires give off EM radiation too, I think the most secure was is to use Pigeons.
Analogy (Score:3, Insightful)
The same proced
Re:Its a very very simple equation (Score:3, Informative)
This is simply not true.
First, you can create a secure wireless network. It's complex, and requires a fair amount of kit, but you can do it. The basic premise is to avoid giving an attacker enough data encrypted with the same WEP key--i.e. rotate your keys frequently. There are several options to do this: EAP/TLS, LEAP, and PEAP to name three. Set your key rotation frequency to 3600 seconds, and you're pretty much set. If you have APs that support EAP/TLS, there is an open source solution [open1x.org].
OTOH, f
Re:Its a very very simple equation (Score:2, Informative)
Tell me, do you know what wifi network your on when your on it?
You know the SSID, but what channel?
You can layer cruft on top and pretend it's secure but when I can send a disconnect to your wifi clients and have them associate with my rouge network, I own your ass.
Did you pay attention at the black hat breifing last year?
Your real network is on channel 6.
I can mirror your wavesec setup, mak
Re:Its a very very simple equation (Score:3, Informative)
Ok, let's take EAP/TLS.
EAP/TLS requires that you have PKI in place. To deploy it, you have to set up a CA. Presumably anyone worth their beans will have used a secure connection to distribute the root certificate and client keys to the wireless users.
The authentication process verifies that both the client and the server are who they claim to be using certificates. If someone tries to forge packets, say with a rogue AP, they won't know the authenticator's secret key and thus the client will reject
Re:Its a very very simple equation (Score:3, Informative)
You might be correct.
I think that this is *more* secure than something as simple as just WEP. But with that said, I think you really should check out the black hat demo from last year.
The point is that the client chooses to associate with the rouge network.
I am not talking about breaking 1024bit PKI, that's foolish. I am talking about breaking the implementation that involves humans.
If I can get a client
Re:Its a very very simple equation (Score:2, Interesting)
I understand where you're coming from, but EAP/TLS clients were written by people who also understand this (at least the ones I've played with). Thus, when validation of the server certificate fails, you don't get an option that says "proceed anyway". On Win XP, you get something that looks like this [cisco.com]. No option to accept.
That's not to say that you can't turn validation off. You can, but it requires that the user go into some in-depth options on their NIC configuration. I, the evil uber-hacker, coul
Re:Its a very very simple equation (Score:2)
The cisco client is the most secure from what a good friend of mine explained tonight. The way that the clients are "locked" is not a normal VPN setup, the exception being cisco.
Anyway it's like 3am or something but the point is that it's possible to get a client to install t
Re:Its a very very simple equation (Score:2, Interesting)
Sure you can, using the same methods to create a secure wired network.
VPN. Man in the middle is inconsequential: all data is encrypted to the VPN gateway, so you can't read the data. If I can't get to the VPN I know something is up. A lot of these posts are talking about the secur
Re:Its a very very simple equation (Score:2)
As long as your not using a VPN that doesn't check host keys, one that doesn't alert you to changed keys, ssh1 or an SSL type of VPN, sure.
It's trival to set up a man in the middle attack for a client if you control the server.
Think about it like this:
A new employee shows up and gets his laptop.
He signs on for the first time and get's a host key changed (even if the key was already stored on the laptop by the IT dept.)
What does he do?
Go make a fool out of himsel
Growing reality ? (Score:2)
Is that a fact ? I'd say since the collapse of the USSR, it must have gone better actually.
Re:Growing reality ? (Score:3, Interesting)
Re:Growing reality ? (Score:3, Informative)
Buran certainly was, ahem, heavily inspired by the U.S. space shuttle, but was different in some ways -- for one thing it was intended to be able to operate without any crew.
Re:Growing reality ? (Score:3, Informative)
The word about the Tu144 is that the Concorde prototype plans that were acquired by the Soviets contained some deliberate mistakes (an old engineering trick) and these led to the crash.
The Russians did have some very good copies of the VAX 11/780 though running VMS. It was only through an almi
Scare Tactics (Score:3, Interesting)
Security is NOT a necessity - in fact, many of the things people are trying to "protect" these days don't need to be protected at all - security consultants just want to rake in commissions as they help their clients "secure" their data.
It's high time that these profiteers take off their Microsoft hats and start acting with the best interest of the end-user in mind.
Absolutely. (Score:3, Insightful)
Yet nobody will put the latest service pack on.
Microsoft software, installed correctly and to their specifications, is as if not more secure than most distributions of Linux. The amount of FUD spread about it is all out of proportion to its flaws, and is probably due to a complete lack of familiarity of its features by its detractors, who would of course use it if it was free. It is this s
Re:Absolutely. (Score:5, Insightful)
But we thought the same thing 24 hours BEFORE the latest service pack came out and we were WRONG
MS's larger number of previous screw ups, slower discovery rate, slower reaction rates, are a strong indication that there are and will continue to be a much higher possbility that you are MS software currently has an undiscovered security flaw waiting to be found by the next lucky fool that thinks he is the MastEr Hack3r.
In addition, it is quite apparent that the number of people capable of installing and maintaing MS software correctly and to their specifications is FAR less then the number of people capable of installing and maintaing Linux software correctly and to their specifications.
Software that is excessivley complex/difficult to install is NOT the best choice for most relatively small businesses.
Re:Absolutely. (Score:3, Insightful)
I would have to disagree here. Maybe the percentages are more in favor of Linux, but I would be willing to bet that there are more people who can install and configure MS software correctly than there are Linux users total.
If even 1% o
Re:Absolutely. (Score:1)
It's just too bad that the point-and-click mentality that Microsoft has created means that it's almost never deployed in a secure fashion.
In my recent testing, however, I would have to say that Windows 2003 server is orders of magnitude more secure out of the box.
Re:Absolutely. (Score:2)
"Microsoft software, installed correctly and to their specifications, is as if not more secure than most distributions of Linux."
Take the Slammer worm for the SQL server for example. If Microsoft staff is lax in applying patches to their own products, do you expect most users to do any better? Firewalls and IDSes do not have to be a $10,000 band-aid. You can use open source and freewar
Re:Scare Tactics (Score:2)
I do believe that even computers with "things" that don't need to be protected at all should be protected as they can be used a zombies to attack other computers. Why do you think that most DDOS attacks come from the unprotected Windows machines?
RF Monitor Mode (Score:5, Insightful)
As useful as this is, its not going todo much to detect or stop the fact that these are just radio waves. And you can't "detect" a hunk of metal out there picking up on them. Almost all new cards are capable of being put into RF monitor mode and sniffing raw 802.11b frames without transmitting anything.
Prism II and Cisco based cards can do it out of the box. Orinoco cards can do it with a patched driver (patched orinoco-cs on linux, WildPackets driver on Windows).
On top of that, AirSnort now compiles on Windows. Its not a fun/easy setup and still has a lot of problems, but it works.
Re:RF Monitor Mode (Score:1)
While I agree with your main point, just a point of fact. "You", the average tech might not be able to detect a card silently sniffing. But "They" certainly can.
An RF receiver is certainly not undetectable the way a RX only wire sniffer on a analog tap is. When an antenna receives a radio wave it retransmit
Real 802.11b security (Score:5, Funny)
FACT: The Illuminati is using 802.11b as a carrier for their Mind Control Rays. When "reputable sources" speak of 802.11b security, they really want you to work closely with an 802.11b source for a while so you receive their programming.
Real 802.11b security can be achieved by the following means:
Purchase a 15 meter (~50') roll of tin foil.
Wash your hair with baking soda. Don't use commerical brands, they have 802.11b signal enhancers which tune your noggin to their Mind Control Ray.
Once dry, wrap your head in a clockwise fashion with the tin foil. Ensure you cover the top of your head, your ears and base of the neck. You can poke small holes in each side to allow sound to reach your ears.
Sit back and laugh knowing that you have true 802.11b security and are safe from The Illuminati's Mind Control Rays.
Who's that at my door? )(#@Ujf0d923j 329 32
CARRIER LOST
air traf's site (Score:4, Informative)
Also, This link [elixar.com] goes to Elixar, the AirTraf project team's new company.
WEP = Weak Encryption Protocol (Score:4, Informative)
WEP is a miserable encryption algorithm. It can be brute-forced within hours, or passively within a day or two. Simply by having WEP enabled on your access point is *no* guarantee whatsoever that your data is secure.
Now, having everything SSH tunnelled and then wrapped in a flaky WEP crust, that's different... But WEP for 802.11(x) makes about as much sense as a bicycle for a mermaid.
Re:WEP = Weak Encryption Protocol (Score:2)
Re:WEP = Weak Encryption Protocol (Score:1)
The whitepaper I read regarding WEP encryption vulnerabilities is the same one i'd imagine everyone else has read. There are a couple of approaches to it, but generally speaking, successful WEP cracking (IIRC) takes upwards of 5-8 million packets, minimu
Re:WEP = Weak Encryption Protocol (Score:2)
I agree that yu can do it with 5-8 millon packets, it just takes about 1050 weak IV packets.
I disagree that it's not possible to brute force the key, such software is out there.
Re:WEP = Weak Encryption Protocol (Score:1)
Yeah, similar story here.. Every mermaid i've ever seen on a bike exhibited the same problems -- The tail flipper either becomes entangled in the spokes, or, the mermaid lacks a strong enough lower-body strength to keep the pedals going on a single-side rotation. Thats not to say bicycles for mermaids are useless... I'm sure there are a few who do manage to get around pretty well with them, but, on the whole, mermaids and bicycles just don't mix.
No Go for Prism2 + HostAP (Score:2, Informative)
Re: No Go for Prism2 + HostAP (Score:1)
I've never been able to get the HostAP drivers into promiscuous mode, myself. Perhaps your problem is somehow related.
Re: No Go for Prism2 + HostAP (Score:1)
Rogue 802.11b != rogue access to company secrets (Score:4, Insightful)
Most wardriving is about finding an open network where you can pull your favorite pr0n from your car on your laptop. And probably for the sheer fun of hacking too. Now, if the admin(s) of a company relie on pirates not being able to plug into the physical ethernet socket for his security, he/they surely should be fired.
In most companies, even if someone gains access to the intranet through 802.11b, he's not going to do much, as the real meat of the company will probably be protected even there. He might get to play with some Windows boxes, see hostnames, sniff this or that, but that's all. True, it's very much better if the guy doesn't see anything in the intranet in the first place, but still, in that worst-case scenario, there is a reasonable level of security left in companies with a decent admin.
Now, 802.11b isn't so secure. If you're really worried, don't use it. If you're really worried and you really want wi-fi, run tunnels over it : it's far from ideal but it's quite secure.
Re:Rogue 802.11b != rogue access to company secret (Score:1)
Super War Driving/Walking? (Score:1, Troll)
Imagine a beowulf cluster ... erm ... imagine a cluster at least of these. You could easily setup a massive centrally located system and have some real fun with a wireless system. With this and AirSnort, you're bound to be able to just about do anything anywhere with a 802.11b access point laying around.
I can see where this would definantelly help out a site admin having a birds eye view of the system itself, but boy was the article right with the comparison that a power tool can be very useful
3 simple steps to improved wireless security (Score:3, Informative)
2) Use strong VPN software to access your network
3) Only allow the AP to talk to the VPN box
So what's the result?
- no WEP problems
- nobody on wireless is inside your network
- nobody can steal access
It's certainly the only sane response I've seen. Other than, of course, "Don't allow wireless at work" which is rapidly becoming the standard.
Re:3 simple steps to improved wireless security (Score:1)
I have actually set this up-
It really is the only sane way to do things-
But remember- there are fun routing issues to deal with when you do this-
The internal VPN endpoint needs to be sent packets (from the internal network)- so you need to run a routing protocol so things know what needs to go to the Internet and what needs to go to the VPN.
Forget Software (Score:1)
Can't Download from Elixar (Score:2)
Use WaveSEC with opportunistic encryption. (Score:5, Interesting)
Note that WaveSEC is NOT a replacement for end-to-end security. All it does is protect you from wireless eavesdroppers. If you are using WaveSEC or end-to-end IPsec for all your network connections, you don't need WAVEsec.
Re:Use WaveSEC with opportunistic encryption. (Score:2)
/. Q&A (Score:1)
And the most common answers are:
BSD is dying
Stephen King, American icon, dead at 53
CmdrTaco is Michael's mutilated sex slave
Micro$oft suxors
Hot grits
Natalie Portman petrified
Mod parent up/down
Frost pist
Another question: why is there a picture of Mr Lee's crotch proudly displayed in the article referenced? Very disturbing. Perhap
Re:/. Q&A (Score:1)
Forgot goatse? (Score:1)
arstechnica article (Score:1)
http://arstechnica.com/paedia/w/wireless/securi
I recently flash to wap11 v2.2's to the dlink dwl-900ap+ bios, and set them up to bridge mac address to mac address with the SSID broadcast turned off, and I used the 256k bit encryption.
How secure is this?
The Casual /.ers's guide to 802.11(a,b,g) Security (Score:3, Informative)
OK here we go:
All you need to get 802.11b (or whatever) working is an access point and a host. The Logical Link (from that OSI model in the first chapter of the MCSE book you never read) indetifiers consist of the ubiquitous MAC address and an SSID. Alllthe client needs to do to connect is specify a valid SSID to the access point in question, voila, free porn on somebody else's dime. Here's the thing, 802.11b access points broadcast their SSIDs.
Some stoggy buggers thought that this kinda sucked, so they decided to wave the magic encryption wand over the system. What they got was the (in)famous WEP, Wire Equivalancy Protocol, or Wireless Encryption Protocol, depending on if you started messing with this before 2001 or not. This stuff comes in 2 main flavors, 56-bit and 128-bit. Two problems with WEP came up round about 2001. First, the key generation algorithim was flawed, and a 56-bit key was really a ~26-bit key, a 128-bit key was really a ~98-bit key. Second, because of the nature of the system it is very easy to gather enough data to preform differential crypto-analyses (aka extracting the keys from a bunch of traffic based on how they are encypted). Detrimental to all hope us poor white hats had of keeping our systems safe, AirSNORT was released, allowing even the cryptographically challanged intruder to compromise the best access points.
Security for the wireless:
Most commercial access points will allow at least some of the following:
Turn off SSID broadcast, this helps, unless the intruder can see a user connecting for the first time, when the client broadcasts the SSID to gain access.
Specify allowed MAC addresses, this also helps, but all an intruder has to do is change the MAC of the intruding interface, nad get on while a client isn't on.
Stuff only a few vendors do:
Use 256-bit encryption, this is pretty good, but only works with compatible cards and drivers. It can also still be cracked by a determined attacker using AirSNORT, (ok, ok a very detemined attacker with some form of supercomputer, but hey there's No Such Agency with that kind of equipment).
Cisco has tech called LEAP, which will do cool things like rotate keys on a 5 minute basis. It is unlikely that an attacker using AirSNORT will get sufficent information to crack the key before it's changed. It'll do some other cool stuff, but I'm not a Cisco rep, so I won't recite the product manual.
A "Best Practice" with wireless is to do some or all of the above, and attach the access point the the outside interface of a VPN gateway. The theory on this is to treat the wireless network like any other external connection.
Now why, if I'm doing all this stuff to secure my network, do I do a Wireless Site Survey at least quarterly at my major sites? Well, because people like easy, and people like to do it themselves. I'm most concerned about someone setting up a combo firewall/access point on my network. The best way to find rogue access points is to play marco polo with a laptop and a directional antenna (if you want good info on that stuff, talk to a friendly neihborhood HAM operator, but a coffee can works pretty well in a pinch).
Stuff you should know about site surving:
Get a good card, preferably one with an external antenna input. See what you can do about getting the right antennas for this knid of thing.
The tool De Jour for this is called Kismet. It does not have all the key cracking kung fu of AirSNORT, but it makes finding the access point pretty easy.
Have you policy in hand for the confrontation with the owner of the rogue access point, wield it with BF&I (Brute Force and Ignorance).
Good luck and happy hunting,
Where do I start? (Score:2)
Nope. SSID is strictly a wireless thing, and has nothing to do with the definition of LLC. 802.3, for example, doesn't know anything about SSIDs.
a 56-bit key was really a ~26-bit key
Wrong again: it's a 64-bit key with 24 bits for the Initialization Vector, leaving 40 bits of actual encryption. I think you are confusing this with 56-bit SSL. Likewise,
Kismet? (Score:1)
Re:Kismet? (Score:2)
Some stolen source code and ideas?
Kismet [kismetwireless.net] definitily is the "Snort" of wireless detection, just like every other IDS company using snorts "engine".
-Rob
Re:And the undocumented feature... (Score:2)
Re:And the undocumented feature... (Score:2, Funny)
-psy
P.S: It was a joke, lighten up!
Re:As one of the AirTraf developers (Score:1, Offtopic)
That really makes me want to install your "security" software.
Re:Is the Linksys wireless router not safe (Score:5, Insightful)
Part of this is an ease of use issue. When you install your first access point you just want to get the thing working. After the initial joy of a succesfull installation it's up to you to turn on WEP and enable MAC filtering. Even then your WiFi network won't be truly secure.
Re:Is the Linksys wireless router not safe (Score:1)
Re:Is the Linksys wireless router not safe (Score:2)
How much do you have to lose? Is this is home or business LAN? Are you in some remote location or in a high density apartment complex?
Re:Is the Linksys wireless router not safe (Score:1)
Re:Wtf??? (Informative, Offtopic, Funny) (Score:1)
See simple huh?
Ok, ok, write it just like you would an html link.
Re:Sharing a wireless connection with strangers (Score:1)
Re:Sharing a wireless connection with strangers (Score:2)