On Fri, Jun 14, 2002 at 09:06:22AM -0500, John Foust wrote:
> 
> I did a little wardriving yesterday with an unusual setup.
> Lacking the expensive sniffer software, I used a WAP11 with
> the site survey function in the Atmel tool.  I wanted it in 
> particular because I'd noticed that it's generic enough to detect
> Cisco 340/350 equipment that's in non-801.11b-compatible mode.
> Netstumbler doesn't.
> 
> For the record, I didn't expect to find much.  I'm in Jefferson, Wis., 
> at the far eastern range of the Bay Area.  I spotted my own APs,
> another WISP's non-WiFi Cisco equipment, two new APs (a default 
> Linksys and an Airport) and a friend's Airport.  I stopped to 
> talk with him.  As I've seen in the logs of my three high-point 
> Cisco APs, he'd seen random associations from MAC addresses he 
> couldn't identify.
> 
> We're both near highways.  I'd theorized that we're seeing
> either trucks with WiFi, commuters with laptops, or other wardrivers.
> This got me thinking about "reverse wardriving," or the art
> and science of watching who passes by your APs.

This is an interesting idea, and I think it would definitely
detect users of Netstumbler, but the Cisco 350 NIC I have
doesn't transmit anything when in RFMon mode.  Even if it
did, I could always turn transmit power down to 1mW or use
the diversity controls to drive the transmission into a
resistor, or what-have-you.  One of the nice things about
surveying wireless networks is that all you have to do is
receive.

-jwb
--
general wireless list, a bawug thing <http://www.bawug.org/>
[un]subscribe: http://lists.bawug.org/mailman/listinfo/wireless

Reply via email to