![]() |
2007-03-24
, 10:27
|
Posts: 91 |
Thanked: 5 times |
Joined on Aug 2006
|
#2
|
![]() |
2007-03-24
, 12:48
|
Posts: 5 |
Thanked: 0 times |
Joined on Mar 2007
@ Alberta, Canada
|
#4
|
![]() |
2007-03-24
, 12:58
|
|
Posts: 3,220 |
Thanked: 326 times |
Joined on Oct 2005
@ "Almost there!" (Monte Christo, Count of)
|
#5
|
![]() |
2007-03-24
, 13:13
|
Posts: 3,401 |
Thanked: 1,255 times |
Joined on Nov 2005
@ London, UK
|
#7
|
![]() |
2007-03-25
, 09:43
|
|
Posts: 304 |
Thanked: 11 times |
Joined on Feb 2007
@ Barcelona, Spain
|
#8
|
![]() |
2007-04-18
, 15:53
|
Posts: 8 |
Thanked: 1 time |
Joined on Apr 2007
|
#9
|
![]() |
2007-04-18
, 16:03
|
Posts: 27 |
Thanked: 0 times |
Joined on Mar 2007
|
#10
|
Can something make a program for 'deep drill' scanning of wi-fi access points?
This program will be very useful!
Simple algoritm of deep drills of APs.
1. Scan a WiFi APs
2. Get list of unprotected APs
3. Trying to connect to (next) AP. If YES go to 4 if NO (MAC table protected) to 3 again.
4. If succesfully connected, trying to get IP (gateway, DNS) via DHCP.
5. If success, then ping by name any known good address (google.com for ex.), if fail go to 9.
6. If good ping, then trying to connect to 80 port.
7. If bad, trying to ping by IP. If 'ping-by-IP' good, then it's an AP with broken DNS but opened, set a known good DNS and ping by name again.
8. check content from 80 port, if got any 'ogin' or 'assword' word, then it's a password protected (usually 'non-free') AP, go to p.3. If no 'ogin' or 'assword', and google connected, then it's good free AP.
9. trying to set up a known IP's like 192.168.1.* (def.gw 192.168.1.1), 192.168.0.*, 10.0.0.* (or something else) and known good external DNSes (if it good open unprotected AP's without good DHCP it may helps), then go to 6.
10. write a good APs to list and display list to user (or automatically connecting and trying to get mail, renew rss feeds and so on).