Regarding the 'Public WiFi' SSID you always see being broadcast as an ad
hoc network: http://www.nmrc.org/pub/advise/20060114.txt. In short, once
you try and join one of those ad hoc networks your system then begins to
rebroadcast that SSID. That is what I attribute to the constant 'Free
Public Wifi' offerings I see constantly. 

That means that someone was still 'Patient Zero' and they probably are
used as honeypots to grab peoples personal info some of the time. But
when a rash of them appeared here at work I went digging and that is
when I found this info.

This was released in 2006, along with this:
http://blogs.chron.com/techblog/archives/2006/09/free_public_wif.html
and was tested with XP SP2. Anyone happen to know if it was, in fact,
updated with Service Pack 3 and Vista/Win 7?

-----Original Message-----
From: Murray Freeman [mailto:mfree...@alanet.org] 
Sent: Friday, August 28, 2009 3:05 PM
To: NT System Admin Issues
Subject: RE: New Attack Cracks WPA in a Minute

Another concer, but for people who don't have a WIFI, or who just like
to mooch, is the fake "Public WIFI" that are 'default' and unsecured. I
understand that these are used by unscrupulous people to capture
personal info. Every now and then, I see one of those in my
neighborhood. 


Murray 


-----Original Message-----
From: Ben Scott [mailto:mailvor...@gmail.com]
Sent: Friday, August 28, 2009 2:01 PM
To: NT System Admin Issues
Subject: Re: New Attack Cracks WPA in a Minute

On Fri, Aug 28, 2009 at 10:46 AM, Jeff Brown<2jbr...@gmail.com> wrote:
> Seriously, what are the odds someone in your neighborhood is lurking 
> around with the technology/desire to break into your home network?

  For a home network, the biggest threat is probabbly someone looking to
mooch Internet access.  Possibly a criminal looking to cover their
tracks.  (How would you like kiddie porn being traced to your IP
address?)  These aren't targeted attacks; anyone will do.  For this sort
of thing, the best countermeasure is to have a neighbor with a less
secure access point.  Same principle as car alarms: Car alarms don't
make it impossible to steal your car; rather, they just make it easier
to steal the car parked next to yours.

  Targeted attacks seem a lot less likely for home networks.

  Certainly, some people/organizations scan for networks to break in to
for data mining purposes.  I'd guess the most likely attack here would
actually come from someone looking for corporate networks (they
typically are of higher value).  In this case, enacting sophisticated
countermeasures -- like turning off SSID broadcast -- might (*might*)
actually draw attention: Attackers scanning the area might see that as a
sign that your network has something to hide.

  I suppose someone could go looking for home networks to steal credit
card numbers, etc., that might be stored on home PCs, but that seems
unlikely.  It's high risk (requires local physical presence) and offers
little reward, and there are much easier alternatives (spyware).

-- Ben

~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to