You cannot do it at all….
Dennis Burgess, CTO, Link Technologies, Inc.
den...@linktechs.net mailto:den...@linktechs.net – 314-735-0270 –
www.linktechs.net http://www.linktechs.net
From: wireless-boun...@wispa.org [mailto:wireless-boun...@wispa.org] On Behalf
Of Mike Hammett
Sent:
J all good. V
Dennis Burgess, CTO, Link Technologies, Inc.
den...@linktechs.net mailto:den...@linktechs.net – 314-735-0270 –
www.linktechs.net http://www.linktechs.net
From: wireless-boun...@wispa.org [mailto:wireless-boun...@wispa.org] On Behalf
Of Tim Kerns
Sent: Tuesday, January
As I was saying, there are differafcnes in what they mean by Rouge AP. If you
do a deauth attack, its illegal, no matter what. What you can do is detect it,
and find the port that its plugged into your network and physically remove it
or turn off that port. (since its yours) no other attack
I got dibs on linksys and NETGEAR1-NETGEAR99 :)
On 01/06/2015 03:16 PM, Scott Piehn wrote:
What would be your take if their AP uses the same SSID as yours.
Assuming Ruckus etc can knock out only that type of AP
-
Scott M Piehn
*From:*
What would be your take if their AP uses the same SSID as yours. Assuming
Ruckus etc can knock out only that type of AP
-
Scott M Piehn
From: Dennis Burgess
Sent: Tuesday, January 6, 2015 3:09 PM
To: WISPA General List
Subject: Re:
On Tue, 6 Jan 2015 16:27:13 -0600 (CST)
Mike Hammett wispawirel...@ics-il.net wrote:
A WISP doesn't own (or lease) everywhere. A company owns or leases their
corporate space.
If a Russian or Chinese spy snuck a MiFi into Lockheed Skunkworks and somehow
passed their other forms of
http://bgr.com/2015/01/06/google-vs-verizon-att-wireless/
Josh Luthman
Office: 937-552-2340
Direct: 937-552-2343
1100 Wayne St
Suite 1337
Troy, OH 45373
___
Wireless mailing list
Wireless@wispa.org
http://lists.wispa.org/mailman/listinfo/wireless
Cool, Google should buy up a huge swath of 3GHz spectrum at auction and
Give it to the public... Makes sense to me :)
On 01/06/2015 03:30 PM, Josh Luthman wrote:
http://bgr.com/2015/01/06/google-vs-verizon-att-wireless/
Josh Luthman
Office: 937-552-2340
Direct: 937-552-2343
1100
Big 'partner' in anti-frequency auctions Google. Who would have guessed.
On Tue, Jan 6, 2015 at 6:30 PM, Josh Luthman j...@imaginenetworksllc.com
wrote:
http://bgr.com/2015/01/06/google-vs-verizon-att-wireless/
Josh Luthman
Office: 937-552-2340
Direct: 937-552-2343
1100 Wayne St
Suite
I can't say much more that this, but on a similar front, some movie
and live theaters are moving toward making the viewing area into a
Faraday Cage...
I expect to see it on a business level soon. I've already been
asked about it...
--
On
Either that or they will need to add the ability back to YouTube to cache
videos locally and only play ads over the airwaves. Data caps are hitting
all cloud services in the pocket book one way or the other. Hands down I
would take a connection that is slower and uncapped than a connection that
is
Same difference, if its their network, they can do what they want. Sux, but
what it is. The SSID is not “registered” to you, you have no more right to it
than they do.
Dennis Burgess, CTO, Link Technologies, Inc.
den...@linktechs.net mailto:den...@linktechs.net – 314-735-0270 –
Hehehe.
Dennis Burgess, CTO, Link Technologies, Inc.
den...@linktechs.net mailto:den...@linktechs.net - 314-735-0270 -
www.linktechs.net http://www.linktechs.net
From: wireless-boun...@wispa.org [mailto:wireless-boun...@wispa.org] On
Behalf Of Sam Tetherow
Sent: Tuesday, January 06,
A WISP doesn't own (or lease) everywhere. A company owns or leases their
corporate space.
If a Russian or Chinese spy snuck a MiFi into Lockheed Skunkworks and somehow
passed their other forms of security, you'd be okay with them chugging away
uploading whatever they found?
-
Mike
While I understand your reasoning, I would disagree. If you could do this,
for the security of a WISP, we will shut down all Access Points via Deauth
attack that my Access Points can see. Also note, I am not talking for the FCC,
but for what I believe is right, in this case, you can’t own a
There is no mention of a blanket refusal. In the FCC citation, the fact that
they're charging for Internet access is brought up every time the deauthing
activity is.
https://apps.fcc.gov/edocs_public/attachmatch/DOC-329743A1.pdf
https://apps.fcc.gov/edocs_public/attachmatch/DA-14-1444A1.pdf
In our corporate environment we have a Cisco wireless environment (indoors)
and we match that with Cisco Prime for things like heat maps, rogue AP
detection, and tracking wireless devices that are associated among other
features.
Yep, and the rouge mitigation would be harmful interference. .
Dennis Burgess, CTO, Link Technologies, Inc.
den...@linktechs.net mailto:den...@linktechs.net – 314-735-0270 –
www.linktechs.net http://www.linktechs.net
From: wireless-boun...@wispa.org [mailto:wireless-boun...@wispa.org]
No one has said anything about the use of rogue AP detection from a
troubleshooting standpoint. In our environment our APs do a monitor mode
cycle occasionally and use the information each AP gives the controller to
determine if something wireless is present. It uses the collected data to
attempt
...but the deauth attack is the best way to capture the handshake!?? How
are we supposed to get the WPA key without the handshake??
On Tue, Jan 6, 2015 at 6:47 PM, Sean Heskett af...@zirkel.us wrote:
In Colorado and many other states with make my day laws you can most
certainly be shot :-/
In Colorado and many other states with make my day laws you can most
certainly be shot :-/
On Tuesday, January 6, 2015, l...@mwtcorp.net wrote:
On Tue, 6 Jan 2015 16:27:13 -0600 (CST)
Mike Hammett wispawirel...@ics-il.net javascript:; wrote:
A WISP doesn't own (or lease) everywhere. A
I have a customer that is being required to get rogue access point detection.
not a one time thing but ongoing detection. What products have people used.
-
Scott M Piehn
___
Wireless mailing
;-)
http://www.aircrack-ng.org/doku.php?id=besside-ng
Literally anybody can do it... just depends on how much time and power they
have to throw at the hashes.
Even easier when you know the provider (like ATT) has a default password
that's 10 digits, numbers only. Generate (or download) a
There are two things that you need to think of and I’m sure different vendors
call it different things, so let me go in depth on this.
One method is to find a access point that has been plugged into the switching
system of a network. Think, a business that someone plugged in a Linksys to or
Nov of last year! http://www.cnn.com/2014/10/03/travel/marriott-fcc-wi-fi-fine/
Dennis Burgess, CTO, Link Technologies, Inc.
den...@linktechs.net mailto:den...@linktechs.net – 314-735-0270 –
www.linktechs.net http://www.linktechs.net
From: wireless-boun...@wispa.org
Yep, you do not control the airwaves in your business, therefor you cannot
interfere with any “access point” that conforms with Part-15.
Dennis Burgess, CTO, Link Technologies, Inc.
den...@linktechs.net mailto:den...@linktechs.net – 314-735-0270 –
www.linktechs.net
Yep J
Dennis Burgess, CTO, Link Technologies, Inc.
den...@linktechs.net mailto:den...@linktechs.net – 314-735-0270 –
www.linktechs.net http://www.linktechs.net
From: wireless-boun...@wispa.org [mailto:wireless-boun...@wispa.org] On Behalf
Of Scott Piehn
Sent: Tuesday, January 06,
Dennis, I think you are taking this to literal. I have the right to detect
and prohibit any wireless access point that is “connected” to my network. I do
not have the right to bar an access point that is within my area of control
from operating as long as it is not using my network for
Ok Dennis you said the same in a later post
From: Tim Kerns
Sent: Tuesday, January 06, 2015 9:08 AM
To: WISPA General List
Subject: Re: [WISPA] Rogue Accesspoint Detection
Dennis, I think you are taking this to literal. I have the right to detect
and prohibit any wireless access point
Looks like detection is ok.
Containment is not.
On the containment side. Is there a way to contain in only the following two
situations
SSID is same as yours
AP is plugged into your network.
-
Scott M Piehn
From: Dennis Burgess
o Thanks for the info.
will pose that question to the auditor
-
Scott M Piehn
From: Dennis Burgess
Sent: Tuesday, January 6, 2015 10:05 AM
To: WISPA General List
Subject: Re: [WISPA] Rogue Accesspoint Detection
Note that many of
Note that many of these systems (rather rogue AP prevention) have been
deemed illegal by the FCC, a hotel chain was fined 600k I think due to
it.
Dennis Burgess, CTO, Link Technologies, Inc.
den...@linktechs.net - 314-735-0270 - www.linktechs.net
From: wireless-boun...@wispa.org
a public place such as a hotel chain vs my private business where I needed
to be able to control the wifi and keep things like wifi pineapples from
snooping on my business would be not allowed?
On Tue, Jan 6, 2015 at 10:05 AM, Dennis Burgess dmburg...@linktechs.net
wrote:
Note that many of
Many commercial solutions, such as Ruckus Wireless (where I work) have
Rouge AP Detection capability built into their APs or controllers. There is
nothing nefarious or illegal surrounding this feature. Let me know if you'd
like to talk further.
Eric Albert
MSO SE
Ruckus Wireless
On Tue, Jan 6,
You can do it all day long within your own company. Marriott was doing it to
force people to give them money. A company doing it has plenty of other
reasons.
-
Mike Hammett
Intelligent Computing Solutions
http://www.ics-il.com
- Original Message -
From: Dennis Burgess
If they can have prevention systems (I assume they do) for all WiFi in NSA,
CIA, Skunkworks, etc., then you can run them in your corporate environment for
security measures.
-
Mike Hammett
Intelligent Computing Solutions
http://www.ics-il.com
- Original Message -
From:
This article goes back a few years but should help to frame this
discussion.
http://www.theruckusroom.net/2010/08/when-wips-really-hurt.html
On Tue, Jan 6, 2015 at 11:43 AM, Dennis Burgess dmburg...@linktechs.net
wrote:
Yep, you do not control the airwaves in your business, therefor you cannot
I think the terms detection and prevention are fairly self explanatory.
-
Mike Hammett
Intelligent Computing Solutions
http://www.ics-il.com
- Original Message -
From: Dennis Burgess dmburg...@linktechs.net
To: WISPA General List wireless@wispa.org
Sent: Tuesday, January
38 matches
Mail list logo