Page 1 of 1

Question about AP Informoration

PostPosted: Wed Jan 14, 2004 8:40 pm
by mourg
Edited to remove spam.

PostPosted: Wed Jan 14, 2004 9:34 pm
by Eyecannon
:(

Didn't you see in the other thread where we were subtly making fun of you?

:(

Fast-movers coming in from the east...

PostPosted: Thu Jan 15, 2004 3:33 am
by Monitr7
...dropping napalm!

Re: Question about AP Informoration

PostPosted: Thu Jan 15, 2004 5:54 am
by Thorn
Mourg,

First, we don't need (or want) your life history. If a question needs some sort of lead-in, then try to keep it to one or two sentences, and then ask the question.

Second, multiple questions in a single post are little more than spam. Most of this has been covered in the FAQs or elsewhere on the board. READ and SEARCH before posting these questions. If you don't find what you're looking for, then ask.

You need to do a lot more research. Again, reading and searching will go a long way here.

As to your specific questions:

Originally posted by mourg
...Is tehre a way to find out who else is logged onto the same public network you are (doesnt even have to give any specific info, more like statistice such as how many people are on the network)...


Yes, it can be done, and it is the same way you'd do this on a wired network.

Originally posted by mourg
...Also, I noticed in netstumbler there is a vendor category which never displays anything when i am picking up signals. Is there any way to find out what type of access point is being used?. ...


It depends. Get a copy of the OUI list and see if the vendor is listed.

Originally posted by mourg
...I have WEP on mine as well as Mac filtering so I am covered. ...


a) MAC filters can be spoofed in less than 1 minute.
b) WEP is known to be broken under certain circumstances. Use it but do NOT trust it completely.

You should use both, but don't rely solely on them. They are just the first step. Think of this like typical locks on a house: they will keep most people honest, but they may not stop someone who is determined. You still need a safe to hide valuables.

The same principles apply to networking.

Originally posted by mourg
...Most of the articles i can find are just news reports giving information about weakness, as opposed to details as how the protocol actually works.


There is plenty of technical information on how the protocol works. Do more research.

Originally posted by mourg
For example, everyone is saying that wireless networks are vunerable to hack. As far as I can tell, worst case is someone gets your WEP key and surf the web. They cannot get access to your system (as far as I know, please correct me if i am wrong on this). So what is the big security risk. Free internet?


Wrong.
It depends on your network setup. In the worst case, anything and everything on your network is exposed. Just because YOU don't know this or understand it, does not mean it cannot be done.

Originally posted by mourg
All you have to do is mac filter them out.


See the answer above. MAC filters are a secondary defense and can be compromised. A MAC can be changed to one on the authorized list very quickly. If they have obtained the WEP key, you have a problem.