This will only work on non-encrypted traffic, assuming you can associate with someones wireless network. If 40 bit encryption is used, it would take a day or so to construct a decrypted library. If 56 bit or even 128 bit encryption is used...good luck! Here is what you should read... http://www.burtleburtle.net/bob/rand/isaac.html#RC4code http://www.ietf.org/internet-drafts/draft-ietf-tls-wireless-00.txt http://www.ietf.org/rfc/rfc2818.txt http://www.ietf.org/rfc/rfc2817.txt http://www.ietf.org/rfc/rfc2246.txt http://www.rsasecurity.com/rsalabs/faq/4-1-2-2.html Yea, I know. I have to get a life! Good Luck! -----Original Message----- From: Zeke Shif [mailto:zekeat_private] Sent: Thursday, April 19, 2001 12:51 PM To: PEN-TESTat_private Subject: Re: [PEN-TEST] Wireless (In)Security http://www.vertrauen.org/wireless/Wavesurfing.html -Zeke myrddin_eat_private wrote: > I'm interested in finding any URLs that discuss Wireless Security Audits > and/or war driving. I am especially interested in hardware and software > used. If you know of any, or have first hand knowledge, please reply. I > have searched (google and astalavista) and not come up with much. > > TIA! > Free, encrypted, secure Web-based email at www.hushmail.com
This archive was generated by hypermail 2b30 : Sat Apr 21 2001 - 04:56:05 PDT