>You have given me an idea.  All I need is a laptop now =)  I would go
>war driving in the area to specifically find businesses running
>unsecured wireless.  I bet I would find some businesses that didn't even
>know they were running wireless such as this thread started out.
>
>Dan

I'd get some legal advice, or at least talk to the FCC, about whether 
this would be a violation of the Communications Act of 1934.  I 
_think_ it would be OK as long as you didn't disclose message content.

>
>-----Original Message-----
>From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf Of
>Stephen Manuel
>Sent: Tuesday, June 25, 2002 10:02 AM
>To: [EMAIL PROTECTED]
>Subject: Re: Rogue Wireless LANs [7:47287]
>
>Neil and others,
>
>Recently I installed in my home a linksys wireless router/switch/ap, it
>works great, yes I have wep enabled.
>
>After installing the equipment, I became really interested in wireless
>networking, reading some books, looking for a certification track,
>scouring
>websites, etc...
>
>I downloaded netstumbler and acquired all the necessary equipment to do
>some
>serious wardriving. I've logged over 300 AP's, mapped them using
>Stumverter
>and MS Mappoint 2002, it gets down to what side of the street the AP was
>on,
>just to add a little spice to the situation, I've got netstumbler to
>play a
>.wav file when it finds an AP.
>
>Amazingly, 75% of the AP's I've found don't have web enabled. A rather
>large
>number of the AP's use the company name as the SSID or use the vendor
>default SSID, ie. tsunami for Cisco.
>
>I'm convinced this whole area of wireless networking is wide open to be
>farmed for business. I've been trying formulate a business plan to
>approach
>businesses to help them install a wireless infrastructure properly and
>setup
>security measures for those companies already in the wireless business
>without implementing security.
>
>What my research has shown me so far is that without upper managements
>support for strict policies with regards to the installation of AP's the
>company is playing a game of russian roulette because the current
>Wireless
>Implementation is FULL of security holes.
>
>Depending on how much security you want to implement here's what I would
>recommend.
>
>Enable WEP - however airsnort a linux utility can crack wep in a
>relatively
>short time
>
>Disable the SSID Broadcast - most AP's have this option, this will
>prevent
>netstumbler from picking up the presence of the AP which makes it a
>little
>more difficult to associate with the AP. Kismet is a linux utility that
>will
>still detect the presence of the AP by passively sniffing for the
>wireless
>packets.
>
>MAC Filtering - enable it but most AP and Wireless cards allow you to
>spoof
>the MAC address, meaning a wireless sniffer like ethereal can sniff out
>a
>few MAC addresses and a hacker can use one to gain access.
>
>Place the AP outside of the firewall
>
>Create VPN access for those wireless clients needing access to internal
>servers.
>
>I'm sure others have done work in this area and can add to the
>discussion.
>
>BTW, interesting enough the first 3 companies I approached about the
>unsecure AP's, 1 denies having wireless networking installed, 2 ignored
>me.
>
>HTH,
>
>Stephen Manuel
>
>
>
>
>----- Original Message -----
>From: "Neil Borne"
>To:
>Sent: Tuesday, June 25, 2002 8:52 AM
>Subject: Re: Rogue Wireless LANs [7:47287]
>
>
>>  The problem that I am coming accross is that some of my customers take
>the
>>  wireless gear outta the box and plug it in and when they figure that
>work
>>  with factory defaults they leave it alone....then all of a sudden
>someone
>>  pulls up in the front yard and starts snooping around.
>>
>>  One thing you can do is WEP and depending on the vendor try some
>filtering
>>  by mac, ssid, or protocol...
>>
>>
>>  You will have do some serious lockdown measures when its a internal
>user
>as
>>  opposed to outside users.......
>>
>>
>>  But like the last email stated if things get bad use netstumbler but
>be
>>  careful from the last I heard it works with only some wireless
>cards...
>>
>>
>>  >From: "Patrick Donlon"
>>  >Reply-To: "Patrick Donlon"
>>  >To: [EMAIL PROTECTED]
>>  >Subject: Rogue Wireless LANs [7:47287]
>>  >Date: Mon, 24 Jun 2002 11:48:48 -0400
>>  >
>>  >I've just found a wireless LAN set up by someone in the building, I
>found
>>  >it
>>  >by chance when I was checking something with a colleague from another
>dept.
>>  >The WLAN has zero security which is not a surprise and lets the user
>into
>>  >the main LAN in the site with a DHCP address served up too! Does
>anyone
>>  >have
>>  >any tips on preventing users and dept's who don't think about
>security
>from
>>  >plugging whatever they like into the network,
>>  >
>>  >Cheers
>>  >
>>  >Pat
>>  >
>>  >
>>  >
>>  >--
>>  >
>>  >email me on : [EMAIL PROTECTED]
>>  _________________________________________________________________
>>  Get your FREE download of MSN Explorer at
>http://explorer.msn.com/intl.asp.




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=47407&t=47287
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to