FW: AirSnort

From: George Heuston (georgeh@private)
Date: Wed Aug 22 2001 - 15:01:53 PDT

  • Next message: George Heuston: "FW: NIPC Daily Report 23 August"

    -----Original Message-----
    From: Walter, Randy [mailto:Randy.Walter@private] 
    Sent: Wednesday, August 22, 2001 10:58 AM
    To: Trimble, Matt; George Heuston
    Subject: RE: AirSnort
    
    
    Matt, thanks for sending this on...
    
    George, as usual the title does an injustice to the rest of the wireless
    world.  From a purely COMMSEC point of view, VPN's with traffic that is
    encrypted off the network, transmitted across a network, then decrypted off
    the network is the only secure traffic out there.  There are no short cuts
    to the handling of secure traffic.  This would be a good topic for the CRIME
    group as a whole... there is still this blind faith in the login screen to a
    network, wireless or wired.
    
    Randy
    
    -----Original Message-----
    From: Trimble, Matt 
    Sent: Wednesday, August 22, 2001 10:22 AM
    To: Walter, Randy
    Subject: FW: AirSnort
    
    
    Thought this was interesting.
    
    -----Original Message-----
    From: George Heuston [mailto:georgeh@private]
    Sent: Wednesday, August 22, 2001 9:21 AM
    To: 'crime@private'
    Subject: AirSnort
    
    
    
    
    > -----Original Message-----
    > From:	Brad Woodward 
    > Sent:	Wednesday, August 22, 2001 8:25 AM
    > To:	Allen Zaugg; George Heuston; Joel Brillhart; Mary Soudrette; Richard
    > Goerling; Roger Bush
    > Cc:	Vince Alexander
    > Subject:	read it and wep
    > 
    > Wireless Networks in Big Trouble
    > Wireless networks are a little less secure today with
    > the public release of "AirSnort," a tool that can
    > surreptitiously grab and analyze data moving across
    > just about every major wireless network. When enough
    > information has been captured, AirSnort can then piece
    > together the system's master password. In other words,
    > hackers and/or eavesdroppers using AirSnort can just
    > grab what they want rom a company's database wirelessly,
    > out of thin air.
    > http://www.wired.com/news/wireless/0,1382,46187,00.html
    > 
    > Brad Woodward
    > Detective
    > Beaverton Police Department
    > Oregon High Tech Team
    > E-mail: bradw@private
    > Desk:  503.615.6657
    > Pager: 503.499.8179
    > Cell:    503.705.7558
    > 
    > CONFIDENTIALITY STATEMENT
    > The information contained in this e-mail message is confidential and is
    > intended only for use of the listed addressee.  If the reader of this
    > message is not the intended recipient, you are hereby notified that any
    > dissemination, distribution or copy of this e-mail message is prohibited.
    > If you have received this message in error, please notify me via the above
    > listed e-mail address.  Thank you.
    > 
    > 
    > 
    > 
    



    This archive was generated by hypermail 2b30 : Sun May 26 2002 - 11:24:19 PDT