Hello Paul, You haven't played with Airopeek MX have you?
within 10 seconds you can get not only the SSID, but a list of MAC addresses connected to it... Just because netstumbler doesn't sniff SSID when clients connect to an AP, doesn't mean that it's secure :) -- Best regards, evilbunny mailto:[EMAIL PROTECTED] http://www.SydneyWireless.com - Exercise your communications freedom to make it do what you never thought possible... Tuesday, September 10, 2002, 11:29:36 AM, you wrote: PG> I have an early Cabletron AP thatI think is optimally configured for PG> security. All clients are requiredto know the SSID, the WEP encryption PG> key and have the right MAC adress. Recent article still claim that all PG> of these precautions can still besidesteped. I tested my AP with PG> Netstumbler and found that if I did not specify my SSID in the profile PG> my client cards would not become activet therefore Netstumbler would not PG> indicate its presence. Is would this be true of all RF devices? Is PG> there a radio wave device that coould still detect my AP brodcast and PG> decode my SSID. If not then does't configuring AP to require the SSID PG> allow it torun in stealth mode? PG> -- PG> NYCwireless - http://www.nycwireless.net/ PG> Un/Subscribe: http://lists.nycwireless.net/mailman/listinfo/nycwireless/ PG> Archives: http://lists.nycwireless.net/pipermail/nycwireless/
smime.p7s
Description: S/MIME Cryptographic Signature
