Hello Rohyt, And this is 1 of the reasons SSL was introduced into the current mapping database, as PTP are planning to use it as an alternative method of authentication for Nocat, rather then having usernames and passwords being sniffed...
-- Best regards, evilbunny mailto:[EMAIL PROTECTED] http://www.SydneyWireless.com - Exercise your communications freedom to make it do what you never thought possible... Tuesday, September 10, 2002, 12:29:41 PM, you wrote: RB> SSID can be "cloaked" - not broadcasted by the AP. However, when a client associates with the AP the SSID is transmitted in a management frame. This is alo picked up by Kismet. Also, if there are RB> no client associations for a long time, the attacker may produce noise thus causing the client to disassociate or the attacker may transmit a spoofed management frame for disassociation. This RB> waill cause the client to re-associate thus revealing the SSID. This further emphasizes that the SSID cannot totally be prevented from being transmitted. A well configured VPN solution may be the RB> right choice for securing the wireless network. RB> -- RB> NYCwireless - http://www.nycwireless.net/ RB> Un/Subscribe: http://lists.nycwireless.net/mailman/listinfo/nycwireless/ RB> Archives: http://lists.nycwireless.net/pipermail/nycwireless/
smime.p7s
Description: S/MIME Cryptographic Signature
