;-) 

http://www.aircrack-ng.org/doku.php?id=besside-ng 

Literally anybody can do it... just depends on how much time and power they 
have to throw at the hashes. 

Even easier when you know the provider (like AT&T) has a default password 
that's 10 digits, numbers only. Generate (or download) a dictionary with every 
possible combination... and use it only on your own network to ensure its 
security. 




----- 
Mike Hammett 
Intelligent Computing Solutions 
http://www.ics-il.com 

----- Original Message -----

From: "Jeremy" <[email protected]> 
To: "WISPA General List" <[email protected]> 
Sent: Tuesday, January 6, 2015 10:00:31 PM 
Subject: Re: [WISPA] Rogue Accesspoint Detection 


...but the deauth attack is the best way to capture the handshake!?? How are we 
supposed to get the WPA key without the handshake?? 


On Tue, Jan 6, 2015 at 6:47 PM, Sean Heskett < [email protected] > wrote: 


In Colorado and many other states with "make my day" laws you can most 
certainly be shot :-/ 



On Tuesday, January 6, 2015, < [email protected] > wrote: 

<blockquote>
On Tue, 6 Jan 2015 16:27:13 -0600 (CST) 
Mike Hammett < [email protected] > wrote: 
> A WISP doesn't own (or lease) everywhere. A company owns or leases their 
> corporate space. 
> 
> If a Russian or Chinese spy snuck a MiFi into Lockheed Skunkworks and somehow 
> passed their other forms of security, you'd be 
>okay with them chugging away uploading whatever they found? 
> 

If I tried to climb over the fence into a secure Lockheed facility I run the 
very real risk of being shot! <humor> Surely your not 
asserting that you have the same right when someone climbs over your back fence 
</humor>. When National Security is asserted the 
rules change. 

The FCC has a history of being fairly draconian when they smell "harmful 
interference". (I've always guessed it's personal 
to them because your playing with their toys. ;-) 
It's always a bad idea to expect to reason with a bureaucrat. It's either OK or 
not. It's all in the book. 
If you have a very deep back pocket you can try and get it in front of a judge 
and argue the merits but they 
tend to defer to the regulators. 

Larry Ash 
> 
> 
> 
> ----- 
> Mike Hammett 
> Intelligent Computing Solutions 
> http://www.ics-il.com 
> 
> ----- Original Message ----- 
> 
>From: "Dennis Burgess" < [email protected] > 
> To: "WISPA General List" < [email protected] > 
> Sent: Tuesday, January 6, 2015 3:09:47 PM 
> Subject: Re: [WISPA] Rogue Accesspoint Detection 
> 
> 
> 
> While I understand your reasoning, I would disagree. If you could do this, 
> for the security of a WISP, we will shut down all 
>Access Points via Deauth attack that my Access Points can see. Also note, I am 
>not talking for the FCC, but for what I believe is 
>right, in this case, you can’t own a location or area of the wifi bands, 
>therefore, you can’t cause harmful interference, and a 
>deauth attack would be harmful, and interference. 
> 
> I can agree that you can detect it and shut it off on a port on your network, 
> but you should not be able to interfere with other 
>operations, regardless if it is your property or not. Maybe that’s not the 
>intent from those actions, but it’s clear that if it’s 
>not on your network then you can’t do much about it. Now, if they are on your 
>property, sure you can tell them to turn it off or 
>leave, but that’s another issue. lol 
> 
> 
> Dennis Burgess, CTO, Link Technologies, Inc. 
> [email protected] – 314-735-0270 – www.linktechs.net 
> 
> 
> 
>From: [email protected] [mailto: [email protected] ] On 
>Behalf Of Mike Hammett 
> Sent: Tuesday, January 06, 2015 2:02 PM 
> To: WISPA General List 
> Subject: Re: [WISPA] Rogue Accesspoint Detection 
> 
> 
> There is no mention of a blanket refusal. In the FCC citation, the fact that 
> they're charging for Internet access is brought up 
>every time the deauthing activity is. 
> 
> https://apps.fcc.gov/edocs_public/attachmatch/DOC-329743A1.pdf 
> 
> https://apps.fcc.gov/edocs_public/attachmatch/DA-14-1444A1.pdf 
> 
> In reading that second one, they also keep bringing up that Marriott charged 
> for Internet (and a lot at that). 
> 
> "Specifically, such employees had used this capability to prevent users from 
> connecting to the Internet via their own personal 
>Wi-Fi networks when these users did not pose a threat to the security of the 
>Gaylord Opryland network or its guests." 
> 
> Sounds like security is a viable defense. 
> 
> 
> 
> ----- 
> Mike Hammett 
> Intelligent Computing Solutions 
> http://www.ics-il.com 
> 
> 
> 
> 
> ----- Original Message ----- 
> 
> 
>From: "Dennis Burgess" < [email protected] > 
> To: "WISPA General List" < [email protected] > 
> Sent: Tuesday, January 6, 2015 11:43:53 AM 
> Subject: Re: [WISPA] Rogue Accesspoint Detection 
> You cannot do it at all…. 
> 
> 
> Dennis Burgess, CTO, Link Technologies, Inc. 
> [email protected] – 314-735-0270 – www.linktechs.net 
> 
> 
> 
>From: [email protected] [ mailto: [email protected] ] On 
>Behalf Of Mike Hammett 
> Sent: Tuesday, January 06, 2015 11:06 AM 
> To: WISPA General List 
> Subject: Re: [WISPA] Rogue Accesspoint Detection 
> 
> 
> You can do it all day long within your own company. Marriott was doing it to 
> force people to give them money. A company doing it 
>has plenty of other reasons. 
> 
> 
> 
> ----- 
> Mike Hammett 
> Intelligent Computing Solutions 
> http://www.ics-il.com 
> 
> 
> 
> 
> 
>From: "Dennis Burgess" < [email protected] > 
> To: "WISPA General List" < [email protected] > 
> Sent: Tuesday, January 6, 2015 10:05:02 AM 
> Subject: Re: [WISPA] Rogue Accesspoint Detection 
> Note that many of these systems (rather rogue AP prevention) have been deemed 
> illegal by the FCC, a hotel chain was fined 600k I 
>think due to it. 
> 
> 
> Dennis Burgess, CTO, Link Technologies, Inc. 
> [email protected] – 314-735-0270 – www.linktechs.net 
> 
> 
> 
>From: [email protected] [ mailto: [email protected] ] On 
>Behalf Of Scott Piehn 
> Sent: Tuesday, January 06, 2015 9:49 AM 
> To: WISPA General List 
> Subject: [WISPA] Rogue Accesspoint Detection 
> 
> 
> 
> 
> I have a customer that is being required to get rogue access point detection. 
> not a one time thing but ongoing detection. What 
>products have people used. 
> 
> 
> 
> 
> --------------------------------------------------------- 
> Scott M Piehn 
> 
> _______________________________________________ 
> Wireless mailing list 
> [email protected] 
> http://lists.wispa.org/mailman/listinfo/wireless 
> 
> 
> _______________________________________________ 
> Wireless mailing list 
> [email protected] 
> http://lists.wispa.org/mailman/listinfo/wireless 
> 
> _______________________________________________ 
> Wireless mailing list 
> [email protected] 
> http://lists.wispa.org/mailman/listinfo/wireless 
> 

Larry Ash 
Senior Network Engineer 
Mountain West Telephone 
123 W 1st St. 
Casper, WY 82601 
Office 307 233-8387 
_______________________________________________ 
Wireless mailing list 
[email protected] 
http://lists.wispa.org/mailman/listinfo/wireless 



_______________________________________________ 
Wireless mailing list 
[email protected] 
http://lists.wispa.org/mailman/listinfo/wireless 


</blockquote>


_______________________________________________ 
Wireless mailing list 
[email protected] 
http://lists.wispa.org/mailman/listinfo/wireless 

_______________________________________________
Wireless mailing list
[email protected]
http://lists.wispa.org/mailman/listinfo/wireless

Reply via email to