Active Topics

 


Reply
Thread Tools
scanman717's Avatar
Posts: 74 | Thanked: 13 times | Joined on Jul 2007 @ Florida
#21
Oh, boy... Where to start....

It IS possible to locate a rogue device on a wireless network and moreover, my wireless network has the ability to triangulate the location of ANY device within a few feet... Do it all the time.. iPhones are my worst nightmare...

In some locations we have a public wifi signal available, but that even requires a login, much like in a hotel or Boingo spot.

Anyway... Just wanted to throw this out there in case anyone thought that they could not be "found" on a wireless network...
 
allnameswereout's Avatar
Posts: 3,397 | Thanked: 1,212 times | Joined on Jul 2008 @ Netherlands
#22
Originally Posted by gnarkill View Post
NEVERMIND!! GOD, simple questions get unsimple answers!!
Have you stopped beating your wife?
__________________
Goosfraba! All text written by allnameswereout is public domain unless stated otherwise. Thank you for sharing your output!
 
allnameswereout's Avatar
Posts: 3,397 | Thanked: 1,212 times | Joined on Jul 2008 @ Netherlands
#23
Originally Posted by Baylink View Post
Ok. As someone who operates a corporate network, let me tell you how this would go.

My access points are routers, running DD-WRT. They're configured for WPA-PSK.

After banging on the network for however long that took, our hero here would finally get connected. And the router would note a new connection, and tell my network management system about it. The NMS would look at the MAC address listed in the packet, note that it doesn't recognize it, and send me an email about it, which my mail system would forward to my BlackBerry, annotated with the manufacturer name derived from the first 3 octets of the MAC.

So, here's this email saying "New unknown wifi connection from 'Nokia Danmark A/S': 00-00-00".

Gee? I wonder who (else) has an n800 in the building and knows the passcode I didn't give them?

Users tend to think about wifi access as "getting to the net". Network managers tend to think about it as "keeping unwanted people out of my fileservers".

Now, stipulated, your wifi in a corporate network shouldn't *be* inside your firewall; users should be required to VPN in to your corpnet even if it's your own wifi they're on... but most people still don't do it that way.
The other thing he wanted to know was something about the infamous sir A. McSpoofing.
__________________
Goosfraba! All text written by allnameswereout is public domain unless stated otherwise. Thank you for sharing your output!
 
sunnydips's Avatar
Posts: 208 | Thanked: 36 times | Joined on Feb 2009 @ Florida
#24
So network professionals might be able to track you down but what about those locked hotspots at coffee shops or airports? I highly doubt starbucks or mcdonalds has a network security guy in the back. Or do they train the baristas and burger flippers?! haha
 
fragos's Avatar
Posts: 900 | Thanked: 273 times | Joined on Aug 2008 @ Fresno CA USA
#25
Is a thief only a thief if caught? Your ethics escape me.
__________________
George Fragos
Internet Coach & Writer
Maemo Mapper HowTo
Personal Blog -- 3 Joe's Blog


N810 -- 5.2010.33-1
 
YoDude's Avatar
Posts: 2,869 | Thanked: 1,784 times | Joined on Feb 2007 @ Po' Bo'. PA
#26
Originally Posted by sunnydips View Post
So network professionals might be able to track you down but what about those locked hotspots at coffee shops or airports? I highly doubt starbucks or mcdonalds has a network security guy in the back. Or do they train the baristas and burger flippers?! haha

Network professionals have many tools at their disposal and are very resourceful...



How do you think these^ guys find you?
 
sunnydips's Avatar
Posts: 208 | Thanked: 36 times | Joined on Feb 2009 @ Florida
#27
I feel like an ***. You're right, stealing is wrong.
 
Posts: 22 | Thanked: 3 times | Joined on Mar 2009
#28
Originally Posted by fragos View Post
Is a thief only a thief if caught? Your ethics escape me.
There you go again.

"Theft" has a very specific legal meaning, and I have seen no case law that applies it even to the more clear cut case of music sharing, much less "use of a non-secured wifi connection and the Internet uplink behind it".

Certainly theft is bad.

People on your side of this argument merely continue not to make a valid, supportable case that the behaviour in question (being technically unsavvy, bringing home a new laptop, not realizing its your neighbor's wifi your getting to the internet with) constitutes anything resembling bad behaviour; see about about 'scienter', and until you can counter that particular argument, stop throwing around words that -- were you talking about a particular person -- might well constitute slander.

I am not a lawyer, but I've been playing one on the Internet for over 25 years...
 
verumgero's Avatar
Posts: 221 | Thanked: 43 times | Joined on Oct 2007 @ Sendai, Japan
#29
NEVERMIND!! GOD, simple questions get unsimple answers!!
Life is never simple.

But this thread has been an interesting read, I didn't know I could be tracked down through wireless. That's kind of creepy in a cool sort of way.
 
allnameswereout's Avatar
Posts: 3,397 | Thanked: 1,212 times | Joined on Jul 2008 @ Netherlands
#30
Originally Posted by Baylink View Post
There you go again.

"Theft" has a very specific legal meaning, and I have seen no case law that applies it even to the more clear cut case of music sharing, much less "use of a non-secured wifi connection and the Internet uplink behind it".
Depends on where the person resides as well, and one doesn't have to be sued with theft specifically. I've seen a case here where someone ran a server using bandwidth, without paying for it, without the owners of the network knowing this. Once they figured it out they sued him for theft -- unsuccesfully. Because one cannot steal 'bandwidth'. Try the same with electricity (as happens with folks who grow their own cannabis in their basement using 'tapped' electricity) and you are hosed.

So while what you say might be true in US if we see it as questionable to help someone who states their specific goal with the tool then we're in our right to refuse to help that person and warn others to not do this. I've also already told him a way around it to solve the issue.

Ofcourse there are cases where murder or robbing a bank is justified. But we cannot assume it is justified when someone asks us for help concerning that...
__________________
Goosfraba! All text written by allnameswereout is public domain unless stated otherwise. Thank you for sharing your output!
 
Reply


 
Forum Jump


All times are GMT. The time now is 00:05.