On Fri, May 21, 2010 at 3:27 PM, Murray Freeman <[email protected]> wrote: > So you are telling me that there are tools that can see something that isn't > being broadcast?
It's still being broadcast. Normally, a wifi AP periodically transmits a "beacon frame" containing the SSID. Member nodes continuously listen for beacon frames. By doing so, they build up that list of local wifi networks. You have told your AP not to transmit those beacon frames, so you won't show up in said list. But in order to participate in a wifi network, member nodes must locate and associate with your AP. That is done in the clear. For example, suppose your network is named "ALANET". Your laptop has to first ask, "Are you there, 'ALANET'?" Your AP will then say, "Yes, I am 'ALANET'." They then proceed to negotiate encryption. All wifi receivers in the area will get those transmissions. Normally, other nodes will ignore your transmissions as unrelated. But sniffer tools will show the contents of those frames, or even present a list of them. On Fri, May 21, 2010 at 3:47 PM, Murray Freeman <[email protected]> wrote: > ... the rest of the neighborhood are broadcasting and several use their > family name. I'm going to assume that they would tend to draw the hackers > more than my "unknown" wifi, and most of them are WPA whereas I'm WPA2. That depends. For someone just looking for a free Internet connection, yes, they will prolly go after the open networks. But some people see things like a so-called "hidden SSID" as a challenge. It's more "fun" to go after such targets. I am told that WPA2 is generally regarded as cryptographically strong, though. So unless there's some kind of unpublished attack happening, you're probabbly in good shape. Unless you have a weak secret, of course. If your WPA2 key is something like "password", "swordfish", "12345", "letmein", or your SSID, then you could be in trouble. -- Ben ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~
