Hello Paul,

You haven't played with Airopeek MX have you?

within 10 seconds you can get not only the SSID, but a list of MAC
addresses connected to it...

Just because netstumbler doesn't sniff SSID when clients connect to an
AP, doesn't mean that it's secure :)

-- 
Best regards,
 evilbunny                            mailto:[EMAIL PROTECTED]

http://www.SydneyWireless.com - Exercise your communications
freedom to make it do what you never thought possible... 

Tuesday, September 10, 2002, 11:29:36 AM, you wrote:

PG> I have an early Cabletron AP thatI think is optimally configured for 
PG> security.  All clients are requiredto know the SSID, the WEP encryption 
PG> key and have the right MAC adress. Recent article still claim that all 
PG> of these precautions can still besidesteped. I tested my AP with 
PG> Netstumbler and found that if I did not specify my SSID in the profile 
PG> my client cards would not become activet therefore Netstumbler would not 
PG> indicate its presence.  Is would this be true of all RF devices?  Is 
PG> there a radio wave device that coould still detect my AP brodcast and 
PG> decode my SSID. If not then does't configuring AP to require the SSID 
PG> allow it torun in stealth mode?
PG> --
PG> NYCwireless - http://www.nycwireless.net/
PG> Un/Subscribe: http://lists.nycwireless.net/mailman/listinfo/nycwireless/
PG> Archives: http://lists.nycwireless.net/pipermail/nycwireless/

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

Reply via email to