![]() |
2007-07-05
, 18:44
|
|
Posts: 102 |
Thanked: 4 times |
Joined on Jun 2007
@ USA
|
#2
|
![]() |
2007-07-05
, 18:47
|
|
Posts: 919 |
Thanked: 37 times |
Joined on Aug 2006
@ /dev/null
|
#3
|
![]() |
2007-07-05
, 19:10
|
|
Posts: 531 |
Thanked: 79 times |
Joined on Oct 2006
@ This side of insane, that side of genius
|
#4
|
![]() |
2007-07-05
, 19:52
|
|
Posts: 47 |
Thanked: 1 time |
Joined on Jun 2007
@ Northwoods of Wisconsin
|
#5
|
![]() |
2007-07-05
, 21:22
|
Posts: 1 |
Thanked: 0 times |
Joined on Jul 2007
|
#6
|
![]() |
2007-07-05
, 21:58
|
|
Posts: 641 |
Thanked: 27 times |
Joined on Apr 2007
|
#7
|
Slakker thats not war drivingWar driving is finding the acces point and compromising it.
![]() |
2007-07-05
, 22:35
|
|
Posts: 919 |
Thanked: 37 times |
Joined on Aug 2006
@ /dev/null
|
#8
|
![]() |
2007-07-06
, 00:56
|
|
Posts: 47 |
Thanked: 1 time |
Joined on Jun 2007
@ Northwoods of Wisconsin
|
#9
|
![]() |
2007-07-06
, 01:15
|
Posts: 5 |
Thanked: 0 times |
Joined on Jul 2007
|
#10
|
I'm working on a security project and I want to use the 770 to detect (and hopefully locate) rogue access points around my work.
The 770 seems like it could be a useful tool for this.
I have Kismet up a running w/o doing any tweaks, but maybe others can share their experiences?
Thanks!