A completely passive attack can capture data and derive a WEP key
without an association. This is the real issue with WEP encryption and
wireless networks.  A wireless network card and AirSnort or Ethereal
will get you the same result.

-----Original Message-----
From: s vermill [mailto:[EMAIL PROTECTED]] 
Sent: Monday, February 03, 2003 2:03 PM
To: [EMAIL PROTECTED]
Subject: RE: kismet [7:62376]


Priscilla Oppenheimer wrote:
> 
> Sitting in a class. It would be very cool if someone answered
> this before the class got out!? :-)
> 
> Is it really true that Kismet can sniff packets on an 802.11
> wireless network, even if you have the access point set up to
> require login/authentication. (assume the hacker doesn't know a
> login)
> 
> From what I know about access points, the hacker would fail to
> associate with the access point, and hence could not see traffic.
> 
> Thanks,
> 
> Priscilla

If I understand the question, I don't see why a wireless sniffer would
need
to associate to an AP.  It's pulling data off the airways similar to a
NIC
in promiscuous mode on a hard-wired network.  Unless the data is
encrypted,
it's available to any wireless sniffer.  Sort of like a police scanner.
But
I sense there is more to the question...




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=62387&t=62376
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to