I think this was discussed on the list a while back, that the Atheros
firmware prevents the promiscuous mode being used. Can anyone confirm
this? Any changes to the policy by the chip manufacturer?
--mikael
___
Openmoko community mailing list
On Sat, May 17, 2008 at 5:28 AM, Brad Midgley [EMAIL PROTECTED] wrote:
Hey
There is an email from Andy Green in March saying says we don't have
monitor mode, which I think means no promiscuous mode.
AFAIK monitor mode and promiscuous mode are two different things.
Monitor mode makes the card
I have an atheros chip in my laptop and I can do both modes.
If just monitor mode is supported, I can do most of the penetrations/
sniffing anyways.
-brandon
On May 17, 2008, at 5:16 AM, Federico Lorenzi [EMAIL PROTECTED]
wrote:
On Sat, May 17, 2008 at 5:28 AM, Brad Midgley [EMAIL
An important difference between Monitor mode and Promiscuous mode is
that in monitor mode you are only a passive receiver and cannot send
any packets out.
In promiscuous mode the device can also transmit packets (on the
network it is associated with).
Another thing, which I am not too sure of so
I have a number of programs that I use, and some that I wrote, for
professional security pen testing (with permission).
I was thinking of making a quick package for doing this automagically.
(btw, does the neo support wpa/wpa2?)
At the very least, it can cache enough requests on the wireless
Brandon Kruse wrote:
What do you guys think? Definitely taking the freerunner into a
completely different market, which I think would be pretty cool.
My $0.02 is that it'd be a handy security test, but also hits a bit of a
gray area where it could be abused too.
Is it based on airsnort or
weplab/airsnort/sniff2air, and a couple other tools.
It is basically gluing a lot of the tools together for ease-of-use.
I agree that it is a bit of a grey area, maybe I could just have a EULA like
most of the programs involved have anyways.
-bk
On Fri, May 16, 2008 at 7:16 PM, ian douglas
I'm sure I read in another post (or the wiki) that WPA was working at least.
On Fri, May 16, 2008 at 6:03 PM, Brandon Kruse [EMAIL PROTECTED] wrote:
I have a number of programs that I use, and some that I wrote, for
professional security pen testing (with permission).
I was thinking of making
Thank You!
And it is the Atheros Chipset, so I will be able to do everything. :)
Thank you for the information!
I am going to start working on it now :)
On Fri, May 16, 2008 at 8:17 PM, Vinc Duran [EMAIL PROTECTED] wrote:
I'm sure I read in another post (or the wiki) that WPA was working at
Of course, it'd be pretty nice to just take your phone
and test your network's security level (which, of
course is too low if you're using WEP) But there are
two major problems, I see: First, I believe the
transmission power of the Freerunner will be kind of
limited, compared to, say an mobile
On Fri, May 16, 2008 at 6:24 PM, Brandon Kruse [EMAIL PROTECTED] wrote:
Thank You!
And it is the Atheros Chipset, so I will be able to do everything. :)
There is an email from Andy Green in March saying says we don't have
monitor mode, which I think means no promiscuous mode.
I see this now, after reading more in depth about the driver itself.
This could be somewhat of a setback :P
I will have to do some more research, maybe see if they plan on adding
that in the future sometime.
Thanks for the input,
-bk
On Fri, May 16, 2008 at 7:29 PM, Steven Kurylo [EMAIL
Hey
There is an email from Andy Green in March saying says we don't have
monitor mode, which I think means no promiscuous mode.
It would also be handy to get master mode. I can't see if ar6k will
work in master mode, but a minipci ar5413 in my laptop at least used
to do this using the closed
13 matches
Mail list logo