what is a MiM attack I have never seen this acronym before?

Thanks
Jayme
----- Original Message ----- 
From: "Jon Erickson CCG" <[EMAIL PROTECTED]>
To: "Trevor" <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>
Sent: Tuesday, March 05, 2002 4:11 PM
Subject: RE: detecting wireless access points


> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> To once again quote David Weiss...
> 
> "Yes, they do."
> 
> In addition...  Running VPN over unWEPed wireless still leaves every
> other network connection that is on the same segment as the wireless
> access point vulnerable.  ARP poisoning attacks over wireless can
> provide some unexpected results.  Even if you use WEP, most keys are
> vulnerable, leaving the same vulnerabilities open.  VLAN your wireless
> network.  VPN is not enough.  (In addition, there is the potential for
> MiM attacks to your encrypted VPN traffic).
> 
> - --
> Jon Erickson         Cryptologist and Security Designer          Caspian
> 415.974.7081  D49B 4561 1078 0A72 DDF3 7250 8EF4 4681 587E 41DD  1728748
> 
> > -----Original Message-----
> > From: Trevor [mailto:[EMAIL PROTECTED]] 
> > Sent: Tuesday, March 05, 2002 8:58 AM
> > To: [EMAIL PROTECTED]; Marc Eiler (Volt); Hornat, Charles; 
> > [EMAIL PROTECTED]
> > Subject: Re: detecting wireless access points
> > 
> > 
> > Even if you had your setup as an AdHoc system running VPN over it?
> > 
> > 
> > ----- Original Message -----
> > From: <[EMAIL PROTECTED]>
> > To: "Trevor S" <[EMAIL PROTECTED]>; "Marc Eiler (Volt)" 
> > <[EMAIL PROTECTED]>; "Hornat, Charles" 
> > <[EMAIL PROTECTED]>; 
> > <[EMAIL PROTECTED]>
> > Sent: Tuesday, March 05, 2002 4:02 AM
> > Subject: RE: detecting wireless access points
> > 
> > 
> > > Yes, they do.
> > >
> > > D. Weiss
> > > MCSE/CCNA/SSP2
> > >
> > >
> > > -----Original Message-----
> > > From: Trevor S [mailto:[EMAIL PROTECTED]]
> > > Sent: Monday, March 04, 2002 5:28 AM
> > > To: Marc Eiler (Volt); Hornat, Charles; 
> > > [EMAIL PROTECTED]
> > > Subject: Re: detecting wireless access points
> > >
> > >
> > > Do sniffers like AirSnort detect the MAC addresses of the 
> > devices that 
> > > are being used?
> > >
> > > On Thursday 28 February 2002 04:36 pm, Marc Eiler (Volt) wrote:
> > > > Depending on the brand of transceiver that you are using, 
> > you may be 
> > > > able to add all of the MAC addresses of the access points 
> > that you 
> > > > are using into the transceiver's DB.  I used a Lucent WaveLAN 
> > > > wireless network, and we were able to prevent anybody from 
> > > > connecting unless we had entered the MAC address into our DB.  I 
> > > > realize that this doesn't address the question of "how do 
> > I discover 
> > > > if a rogue is connected", but this information may be 
> > able to allow 
> > > > you to not to have to worry about the need to detect rogue 
> > > > connections.
> > > >
> > > > Virtually,
> > > > MarC Eiler
> > > >
> > > > -----Original Message-----
> > > > From: Hornat, Charles [mailto:[EMAIL PROTECTED]]
> > > > Sent: Friday, February 22, 2002 1:22 PM
> > > > To: [EMAIL PROTECTED]
> > > > Subject: detecting wireless access points
> > > >
> > > > What is the best method to discover rogue wireless access 
> > points on 
> > > > your network?  Other than the obvious, buy a laptop with 
> > a wireless 
> > > > card and search theory.  Is there a network tool that 
> > would detect a 
> > > > wireless access point being plugged in?
> > > >
> > > > As a security administrator, I would like to have the ability to 
> > > > know if a user has purchased an access point and plugged 
> > it into my 
> > > > network.
> > > >
> > > > Any thoughts are appreciated.
> > > >
> > > > mrcorp
> > > >
> > > >
> > > > ________________________________________________________________
> > > > The information contained in this message is intended 
> > only for the 
> > > > recipient, may be privileged and confidential and protected from 
> > > > disclosure. If the reader of this message is not the intended 
> > > > recipient, or an employee or agent responsible for 
> > delivering this 
> > > > message to the intended recipient, please be aware that any 
> > > > dissemination or copying of this communication is strictly 
> > > > prohibited. If you have received this communication in 
> > error, please 
> > > > immediately notify us by replying to the message and deleting it 
> > > > from your computer.
> > > >
> > > > Thank you,
> > > > Standard & Poor's
> > >
> > >
> > >
> > 
> > 
> -----BEGIN PGP SIGNATURE-----
> Version: PGPfreeware 7.0.3 for non-commercial use <http://www.pgp.com>
> 
> iQA/AwUBPIVeoI70RoFYfkHdEQKXWwCgtYepLwP4ZCeAkycH4tD+1osdvxkAnR7f
> pAmOxNxMMEPuYuBag9scQCse
> =VWVz
> -----END PGP SIGNATURE-----

Reply via email to