FAG: Frequently Asked Glossary

Fag: Frequently Asked Glossary

Postby blackwave » Mon Apr 14, 2003 7:47 am

QUESTION: What is the difference betwen monitor and promiscuous mode?

ANSWERS:
Monitor mode enables a wireless nic to capture packets without associating with an access point or ad-hoc network. This is desireable in that you can choose to "monitor" a specific channel, and you need never transmit any packets. In fact transmiting is sometimes not possible while in monitor mode (driver dependent). Another aspect of monitor mode is that the NIC does not care whether the CRC values are correct for packets captured in monitor mode, so some packets that you see may in fact be corrupted.
Promiscuous mode allows you to view all wireless packets on a network to which you have associated. The need to associate means that you must have some measn of authenticating yourself with an access point. In promiscuous mode, you will not see packets until you have associated. Not all wireless drivers support promiscuous mode.

SOURCE http://airsnort.shmoo.com/faq.html
-=BW=-
User avatar
blackwave
 
Posts: 4507
Joined: Mon Apr 15, 2002 3:00 am
Location: SoCal, OC

Common Acronyms

Postby Thorn » Mon Apr 14, 2003 8:33 am

ACL - Access Control List
AP - Access Point
BSSID - Basic Service Set Identifier
EIRP - Equivalent Isotropically Radiated Power
ERP - Equivalent Radiated Power
ESSID - Extended Service Set Identifier
ISM - Industrial, Scientific, Medical
FCC - Federal Communications Commission
FTP - File Transfer Protocol
FZ - Fresnel Zone
HTTP - HyperText Transfer Protocol
MAC - Machine Address Code
NIC - Network Interface Cards
POP3 - Post Office Protocol v.3
RF - Radio Frequency
RFI - Radio Frequency Interference
RSSI - Received Signal Strength Indication
SMTP - Simple Mail Transfer Protocol
SNMP - Simple Network Management Protocol
SOM - Sytem Operating Margin
SSID - Service Set Identifier
SSL - Secure Socket Layer
VPN - Virtual Private Networks
WAP - Wireless Access Point; same as an AP
WEP - Wired Equivalent Privacy
WLAN - Wireless Local Area Network
Thorn
Stop the TSA now! Boycott the airlines.
Thorn
 
Posts: 10340
Joined: Sat Apr 13, 2002 3:00 am
Location: Villa Straylight

Terminology 101

Postby peekitty » Sun Feb 29, 2004 5:43 pm

Q: I’m confused by the all the acronyms, hit me with the clue-by-four.
A: Tattoo these on the back of your hand:

BSS = Basic Service Set - a simple 802.11 network consisting of an access point and its clients.
ESS = Extended Service Set - a distributed network composed of more than one wireless access point and its clients.
IBSS = Independent BSS - an 802.11 network in ad-hoc mode. Though it's usually composed exclusively of wireless adapters, some standalone devices can function in ad-hoc mode.
BSSID = the unique "hardware ID" of a device, the MAC address.
ESSID = the "network name" of a wireless LAN operating in infrastructure mode, this term is frequently shortened to "SSID."
IBSSID = Independent BSSID - in ad-hoc networks, the IBSSID is generated randomly.
User avatar
peekitty
 
Posts: 1054
Joined: Wed Sep 04, 2002 6:14 am
Location: S. Florida

Postby G8tK33per » Thu Feb 03, 2005 11:04 am

Additions..
wrzwaldo wrote:CM - Client Manager

The software normally shipped with wireless adapters. Used to make connections to wireless networks.


WZC - Wireless Zero Configuration

Wireless Auto Configuration, available in Windows XP and Windows Server 2003, dynamically selects the wireless network to which to attempt connection, based either on your preferences or on default settings. This includes automatically selecting and connecting to a more preferred wireless network when it becomes available. If none of the preferred wireless networks are found nearby, Wireless Auto Configuration configures the wireless adapter so that there is no accidental connection until the wireless client roams within the range of a preferred network.


SSH - Secure Shell

Secure Shell (SSH), sometimes known as Secure Socket Shell, is a UNIX-based command interface and protocol for securely getting access to a remote computer. It is widely used by network administrators to control Web and other kinds of servers remotely. SSH is actually a suite of three utilities - slogin, ssh, and scp - that are secure versions of the earlier UNIX utilities, rlogin, rsh, and rcp. SSH commands are encrypted and secure in several ways. Both ends of the client/server connection are authenticated using a digital certificate, and passwords are protected by being encrypted. SSH uses RSA public key cryptography for both connection and authentication. Encryption algorithms include Blowfish, DES, and IDEA. IDEA is the default.
"Make yourselves sheep and the wolves will eat you." ~ Benjamin Franklin

Sons of Confederate Veterans
User avatar
G8tK33per
 
Posts: 6078
Joined: Fri May 09, 2003 4:00 am
Location: Goomba's Booty Boardwalk


Return to WiFi

Who is online

Users browsing this forum: No registered users and 1 guest

cron