Page 1 of 1

Fag: Frequently Asked Glossary

PostPosted: Mon Apr 14, 2003 7:47 am
by blackwave
QUESTION: What is the difference betwen monitor and promiscuous mode?

ANSWERS:
Monitor mode enables a wireless nic to capture packets without associating with an access point or ad-hoc network. This is desireable in that you can choose to "monitor" a specific channel, and you need never transmit any packets. In fact transmiting is sometimes not possible while in monitor mode (driver dependent). Another aspect of monitor mode is that the NIC does not care whether the CRC values are correct for packets captured in monitor mode, so some packets that you see may in fact be corrupted.
Promiscuous mode allows you to view all wireless packets on a network to which you have associated. The need to associate means that you must have some measn of authenticating yourself with an access point. In promiscuous mode, you will not see packets until you have associated. Not all wireless drivers support promiscuous mode.

SOURCE http://airsnort.shmoo.com/faq.html

Common Acronyms

PostPosted: Mon Apr 14, 2003 8:33 am
by Thorn
ACL - Access Control List
AP - Access Point
BSSID - Basic Service Set Identifier
EIRP - Equivalent Isotropically Radiated Power
ERP - Equivalent Radiated Power
ESSID - Extended Service Set Identifier
ISM - Industrial, Scientific, Medical
FCC - Federal Communications Commission
FTP - File Transfer Protocol
FZ - Fresnel Zone
HTTP - HyperText Transfer Protocol
MAC - Machine Address Code
NIC - Network Interface Cards
POP3 - Post Office Protocol v.3
RF - Radio Frequency
RFI - Radio Frequency Interference
RSSI - Received Signal Strength Indication
SMTP - Simple Mail Transfer Protocol
SNMP - Simple Network Management Protocol
SOM - Sytem Operating Margin
SSID - Service Set Identifier
SSL - Secure Socket Layer
VPN - Virtual Private Networks
WAP - Wireless Access Point; same as an AP
WEP - Wired Equivalent Privacy
WLAN - Wireless Local Area Network

Terminology 101

PostPosted: Sun Feb 29, 2004 5:43 pm
by peekitty
Q: I’m confused by the all the acronyms, hit me with the clue-by-four.
A: Tattoo these on the back of your hand:

BSS = Basic Service Set - a simple 802.11 network consisting of an access point and its clients.
ESS = Extended Service Set - a distributed network composed of more than one wireless access point and its clients.
IBSS = Independent BSS - an 802.11 network in ad-hoc mode. Though it's usually composed exclusively of wireless adapters, some standalone devices can function in ad-hoc mode.
BSSID = the unique "hardware ID" of a device, the MAC address.
ESSID = the "network name" of a wireless LAN operating in infrastructure mode, this term is frequently shortened to "SSID."
IBSSID = Independent BSSID - in ad-hoc networks, the IBSSID is generated randomly.

PostPosted: Thu Feb 03, 2005 11:04 am
by G8tK33per
Additions..
wrzwaldo wrote:CM - Client Manager

The software normally shipped with wireless adapters. Used to make connections to wireless networks.


WZC - Wireless Zero Configuration

Wireless Auto Configuration, available in Windows XP and Windows Server 2003, dynamically selects the wireless network to which to attempt connection, based either on your preferences or on default settings. This includes automatically selecting and connecting to a more preferred wireless network when it becomes available. If none of the preferred wireless networks are found nearby, Wireless Auto Configuration configures the wireless adapter so that there is no accidental connection until the wireless client roams within the range of a preferred network.


SSH - Secure Shell

Secure Shell (SSH), sometimes known as Secure Socket Shell, is a UNIX-based command interface and protocol for securely getting access to a remote computer. It is widely used by network administrators to control Web and other kinds of servers remotely. SSH is actually a suite of three utilities - slogin, ssh, and scp - that are secure versions of the earlier UNIX utilities, rlogin, rsh, and rcp. SSH commands are encrypted and secure in several ways. Both ends of the client/server connection are authenticated using a digital certificate, and passwords are protected by being encrypted. SSH uses RSA public key cryptography for both connection and authentication. Encryption algorithms include Blowfish, DES, and IDEA. IDEA is the default.