On 2006/06/05 18:47, Darrin Chandler wrote:
> On Tue, Jun 06, 2006 at 01:31:38AM +0100, Stuart Henderson wrote:
> > If it's some hotspot-like setup, you don't need to circumvent
> > anything since you already have access to the network.
> 
> You'd be sniffing encrypted traffic at that point, right?

Not if you poison ARP, since the traffic will be directed
to your MAC address and the AP will send it encrypted with
your key. It's just an ethernet-type network, remember.
(You can do the same thing with bridged VPNs, too).

It's not as straightforward as just running `tcpdump' but
it's not hugely difficult, and uses well-known tools.

If you've been keeping an eye on what Reyk's been doing
you might have noticed his description of scalable networks
(http://www.openbsd.org/papers/bsdcan06-wlan/slide_12.html)
with each client in its own /30 - this is not only useful
for dynamic routing, it also ensures no free IP address
for the ARP tricks involved.

Reply via email to