> Yes, but to prove bad faith on their part, you need to produce your

> logs. In other words, you don't know it's OK to snoop on them, until

> you've snooped on them. Are your logs admissible in court? What if

> their little brother spent the afternoon playing with the system

> settings and left it so that it would bind to the first access point

> it came across?


Not sure what log you are talking about.  There's no log that specifies that 
your router is encrypted.  If you are contacting law enforcement to tell them 
that you've been hacked, you aren't using an open router.


Also not sure what you are talking about with the little brother scenario.  If 
someone's little brother played with a setting, it would not enable the 
computer to authenticate to a foreign WAP encrypted with WEP or WPA.


About 60-70% of all US WPA/2 sites are crackable with a reverse lookup or 
"rainbow" table.  WEP is insecure, but widely used.


------------------------------------------------------------------------
Test Your IDS

Is your IDS deployed correctly?
Find out quickly and easily by testing it 
with real-world attacks from CORE IMPACT.
Go to 
http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw
 
to learn more.
------------------------------------------------------------------------

Reply via email to