Considering that tools such as Kismet do not rely on any type of broadcasting methods, 
they actively probe for setups, this is a moot point. I have actually had kismet probe 
a card on a laptop and show me every setup that the card was used for. After 
confronting the user of the card with the results of the probe, they were astonished 
to see that I not only saw the active profile, but three others that were configured 
for that card. And with Kismet, we were able to retrieve the SSID from the CISCO 
without an association by the one and only client machine that was actually configured 
for that particular AP. Ant we did this with both a Linux box using Kismet, and an XP 
box using NetStumbler with an Netgear WAB501 using WAB511 drivers. Of course the XP 
box took longer, about two minutes, but this rig by far found more AP and held them 
for a much longer time than the Linux box could.


-----Original Message-----
From: David Gillett [mailto:[EMAIL PROTECTED] 
Sent: Friday, June 06, 2003 5:47 PM
To: 'Bo Mendenhall'; [EMAIL PROTECTED]
Subject: RE: wireless access point

  It seems to me that the distinction between "detect and
report about a previously-unknown available access point"
and "detect ACTIVE USE of a previously-unknown available
access point" is that the latter is of far less use....

David Gillett

> -----Original Message-----
> From: Bo Mendenhall [mailto:[EMAIL PROTECTED]
> Sent: June 6, 2003 13:25
> To: [EMAIL PROTECTED]
> Subject: RE: wireless access point
>
>
> Please correct me if I'm wrong:
>
> Marvin's Statement below is true because eventually someone
> who has the SSID for an AP will hop on the AP, at which time
> it broadcasts the SSID, so Netstumbler would potentially pick
> it up the SSID at that point.
>
> >>> "Myers, Marvin" <[EMAIL PROTECTED]> 06/06/03 12:34PM >>>
> That is not entirely true. Netstumbler does in fact detect
> AP's that do not broadcast their SSID, it just takes longer.
> I have proven this on more than one occasion using
> NetStumbler on XP with both Orinoco and Netgear cards.
>
> -----Original Message-----
> From: Christopher Harrington [mailto:[EMAIL PROTECTED]
> Sent: Friday, June 06, 2003 1:23 PM
> To: [EMAIL PROTECTED]; [EMAIL PROTECTED]
> Subject: RE: wireless access point
>
> Netstumbler does not detect AP's that do not broadcast their
> SSID. I know Kismet and Wellenreiter do, I cant speak for the others.
>
> --Chris
>
>
> -----Original Message-----
> From: Luiz Otávio Duarte [mailto:[EMAIL PROTECTED]
> Sent: Thursday, June 05, 2003 9:54 PM
> To: [EMAIL PROTECTED]
> Subject: RE: wireless access point
>
>
> Hi,
>
> >Is there any way of detecting wireless access point that doesn't
> >broadcast
> >the SSID?
>
> Yep, It's possible. I will tell you why:
>
>    We have two probing modes for channels in a 802.11 network.
>
>   - Activing probe - Is when the prober machine exchange some
> probe frames
> with the AP.
>
>   - RFMON - Radio Frequency Monitor (Passive probe) - when
> the probe machine
> capture all data in the channel and try to find some SSID
> (Service Set
> Identification)
>
>   You can find AP that does not broadcast the SSID using any
> probe technique.
>
>   You can use: Netstumbler, DStumbler, Kismet, Wellenreiter, THC-RUT,
> WEPCrack, AirSnort, ....
>
> That's All Folks!
>
> --
> ##
> # Luiz Otávio Duarte (lod at acmesecurity dot org)
> # www.acmesecurity.org/~lod
> ##
> # ACME! (Computer Security Research)
> # www.acmesecurity.org
> ##
> # Unesp - São José do Rio Preto - São Paulo - Brazil
> ##
>
> --------------------------------------------------------------
> -------------
> --------------------------------------------------------------
> --------------
>
>
> --------------------------------------------------------------
> -------------
> --------------------------------------------------------------
> --------------
>
>
> --------------------------------------------------------------
> -------------
> --------------------------------------------------------------
> --------------
>
>
>
> --------------------------------------------------------------
> -------------
> Evaluating SSL VPNs' Consider NEOTERIS, chosen as leader by
> top analysts!
> The Gartner Group just put Neoteris in the top of its Magic Quadrant,
> while InStat has confirmed Neoteris as the leader in marketshare.
>
> Find out why, and see how you can get plug-n-play secure
> remote access in
> about an hour, with no client, server changes, or ongoing maintenance.
>
> Visit us at: http://www.neoteris.com/promos/sf-6-9.htm
> --------------------------------------------------------------
> --------------
>


---------------------------------------------------------------------------
Evaluating SSL VPNs' Consider NEOTERIS, chosen as leader by top analysts!
The Gartner Group just put Neoteris in the top of its Magic Quadrant,
while InStat has confirmed Neoteris as the leader in marketshare.
     
Find out why, and see how you can get plug-n-play secure remote access in
about an hour, with no client, server changes, or ongoing maintenance.
          
Visit us at: http://www.neoteris.com/promos/sf-6-9.htm
----------------------------------------------------------------------------


---------------------------------------------------------------------------
Evaluating SSL VPNs' Consider NEOTERIS, chosen as leader by top analysts!
The Gartner Group just put Neoteris in the top of its Magic Quadrant,
while InStat has confirmed Neoteris as the leader in marketshare.

Find out why, and see how you can get plug-n-play secure remote access in
about an hour, with no client, server changes, or ongoing maintenance.

Visit us at: http://www.neoteris.com/promos/sf-6-9.htm
----------------------------------------------------------------------------

Reply via email to