top bar
QuickTopic free message boards logo
Skip to Messages


LA Wardriving with -- and Kismet

04:56 AM ET (US)

cheapest, best service have it on
wow gold .
so many wonderful things you can enjon it not only cheapest price,best distrubition,all from
wow leveling,
warcraft power leveling
warcraft gold promptly,best service only get it from
wow power leveling
Buy FFXI Gil
FFXI Gil Sale
Cheapest FFXI Gil
Buy Cheap FFXI Gil
final Fantasy XI Gil
Cheap FFXI Gil

cheapestwow gold
best distrubition,all fromus wow gold
euro wow gold
world of warcraft gold
Frank K
08:50 PM ET (US)
The APs leaked information such as IP addresses, email, email addresses etc. It's not that hard to see this in Kismet. Press "D" in the main Kismet window and you can see clear text data flying by.
the fly
11:25 PM ET (US)
Mike O - ok, fair cop. I hadn't considered the possibility that they analysed the traffic from Kismet (agreed - v.handy tool).

So, hands up those who think they analysed captured data from all 400 "AP"'s???? ;)
John SaxtonPerson was signed in when posted
01:01 PM ET (US)
Because WEP isn't considered to be secure enough and WPA isn't supported by enough vendors yet, many, if not most, businesses put their Wi-Fi networks outside of their firewall, and make their employees use VPN to get back inside. So, finding a non-WEP network doesn't tell you much.

If you connect to the network, you might get a DHCP lease and be able to get to the Internet, but you wouldn't be able to get onto that company's network. You might even see some "servers" in your "Connect to Server"/Network Neighborhood window, but those are most likely laptops that happen to have personal file sharing enabled, rather than corporate IT servers with serious amounts of sensitive data.

So, counting non-WEP networks is very misleading, and fear mongering.
Mike O
02:30 AM ET (US)
You're right, WEP is only one form of encryption.

However, to tell if a network is encrypted, you merely have to *receive* the signal. You don't need to access it.

That's what's so cool about Kismet & Airmagnet - they just receive. You can tell a lot about a network by just listening. And you can see what is, and is not, encrypted by listening to those signals floating through the air - WEP or otherwise.

Unscientific observations put the encrypted networks at about 50% - with about 30% using WEP. Which, of course, leaves about 50% "totally open, vulnerable, unencrypted". And probably a decent fudge factor for encrypted traffic like VPNs and SSL web pages running over those open links.

Now it's time for me to nerd out with an eBook on my iPaq.
10:41 PM ET (US)
Y'all are such nerds.
Kernel SantosPerson was signed in when posted
09:58 PM ET (US)
For OS X you can try KisMAC:
Its GUI-rific.
John ParresPerson was signed in when posted
09:53 PM ET (US)
I hope y'all stopped somewhere along the way for a bowl of Pho! :D - JP
the fly
09:41 PM ET (US)
I always cringe when I read such things as "no attempt to access" and "totally unprotected" in the same paragraph.

Just because WEP is not activated it does not mean that some other form of encryption is in use.

By definition, if you know that "The percentage of these which were totally open, vulnerable, unencrypted networks was mindboggling" then you MUST have tried to access them.. no? hmmm.... :)
06:03 PM ET (US)
Kismet also just got (long awaited) MacOS X support in the latest cvs. Airport (not extreme) only though.

Print | RSS Views: 4104 (Unique: 1772 ) / Subscribers: 1 | What's this?