Hello Rohyt,

And this is 1 of the reasons SSL was introduced into the current
mapping database, as PTP are planning to use it as an alternative
method of authentication for Nocat, rather then having usernames and
passwords being sniffed... 

-- 
Best regards,
 evilbunny                            mailto:[EMAIL PROTECTED]

http://www.SydneyWireless.com - Exercise your communications
freedom to make it do what you never thought possible... 

Tuesday, September 10, 2002, 12:29:41 PM, you wrote:

RB> SSID can be "cloaked" - not broadcasted by the AP. However, when a client 
associates with the AP the SSID is transmitted in a management frame. This is alo 
picked up by Kismet. Also, if there are
RB> no client associations for a long time, the attacker may produce noise thus 
causing the client to disassociate or the attacker may transmit a spoofed management 
frame for disassociation. This
RB> waill cause the client to re-associate thus revealing the SSID. This further 
emphasizes that the SSID cannot totally be prevented from being transmitted. A well 
configured VPN solution may be the
RB> right choice for securing the wireless network.
RB> --
RB> NYCwireless - http://www.nycwireless.net/
RB> Un/Subscribe: http://lists.nycwireless.net/mailman/listinfo/nycwireless/
RB> Archives: http://lists.nycwireless.net/pipermail/nycwireless/

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

Reply via email to