On Fri, Jun 14, 2002 at 09:06:22AM -0500, John Foust wrote: > > I did a little wardriving yesterday with an unusual setup. > Lacking the expensive sniffer software, I used a WAP11 with > the site survey function in the Atmel tool. I wanted it in > particular because I'd noticed that it's generic enough to detect > Cisco 340/350 equipment that's in non-801.11b-compatible mode. > Netstumbler doesn't. > > For the record, I didn't expect to find much. I'm in Jefferson, Wis., > at the far eastern range of the Bay Area. I spotted my own APs, > another WISP's non-WiFi Cisco equipment, two new APs (a default > Linksys and an Airport) and a friend's Airport. I stopped to > talk with him. As I've seen in the logs of my three high-point > Cisco APs, he'd seen random associations from MAC addresses he > couldn't identify. > > We're both near highways. I'd theorized that we're seeing > either trucks with WiFi, commuters with laptops, or other wardrivers. > This got me thinking about "reverse wardriving," or the art > and science of watching who passes by your APs.
This is an interesting idea, and I think it would definitely detect users of Netstumbler, but the Cisco 350 NIC I have doesn't transmit anything when in RFMon mode. Even if it did, I could always turn transmit power down to 1mW or use the diversity controls to drive the transmission into a resistor, or what-have-you. One of the nice things about surveying wireless networks is that all you have to do is receive. -jwb -- general wireless list, a bawug thing <http://www.bawug.org/> [un]subscribe: http://lists.bawug.org/mailman/listinfo/wireless
