[TriLUG] Wireless at Lowes
uncleben at mindspring.com
Mon Dec 1 11:04:23 EST 2003
Out of curiosity, how did you go about determining that there was an attempt
on your WEP key, and by whom? I'm really rather curious, because there are
at least 7 or 8 wireless points in my neighborhood, though we are spread out
enough to not step on each other's channels. Were I to sit in the middle of
my back yard, however, I'm fairly certain that I could get good enough
signal to connect to at least 3 or 4 of them, other than my own.
Additionally, I only know of 2 others, besides my own, that use WEP keys.
I'd just like to keep an eye out to see if someone is trying to get in on my
network (despite my MAC filtering), and if you can provide us with some
procedures for doing this, I'd be grateful.
Incidentally, this might make a good class at some point: Intrusion
detection, specifically with an eye towards doing it without having to
scrape through thousands of lines of logs every day. Intrusion detection
and reporting for the SOHO/home user. Anyone think they could teach that
"Those that can give up essential liberty to obtain a little temporary
safety deserve neither liberty nor safety."
> -----Original Message-----
> From: trilug-bounces at trilug.org [mailto:trilug-bounces at trilug.org]On
> Behalf Of Greg Brown
> Sent: Sunday, November 30, 2003 10:51 PM
> To: Triangle Linux Users Group discussion list
> Subject: Re: [TriLUG] Wireless at Lowes
> I've actually been looking into this and I don't have a clear answer
> however the law is fairly clear that if you DO attach to a network in
> any way, shape, or form and you cause damage or otherwise use that
> connection for malicious activity you are in violation of many laws.
> Now, there is a big difference between using a program like netstumbler
> which listens for ESSID broadcasts and actually hopping on a wireless
> network (yeah, yeah, NS does some broadcasting to initiate responses
> but let's keep the argument simple). I've done the latter several
> times by accident but since I wasn't doing anything malicious, and I
> changed my network when I discovered my error, I don't see how a jury
> could convict me if I did break the law (assuming that I could get a
> jury that could understand networks and such).
> The neighbor kid was dumb enough to try to crack my wep keys. The
> first time it happened I walked over to his house and had a sit-down
> with him and his parents. I made it clear the next time he tried it I
> would be contacting law enforcement. There hasn't been a second time
> though I am moving to IPSec over OpenBSD to combat such activity in the
> On Sunday, Nov 30, 2003, at 21:45 US/Eastern, Mike Johnson wrote:
> > z [zzd at contentdb.net] wrote:
> >> Curious, is it legal to attach to any wireless network that does not
> >> have
> >> security provisions in place? e.g Attaching to your neighbors access
> >> point
> >> for faster than modem downloads, or sitting in the parking lot
> >> outside an
> >> office block?
> > Is it legal to use a scanner to listen in on your neighbor's cordless
> > phone? Were it not explicitly illegal, would you still do it? Would
> > it
> > still be okay?
> > The question is: just because you can, should you?
> > Mike
> > --
> > "If life hands you lemons, YOU BLOW THOSE LEMONS TO BITS WITH
> > YOUR LASER CANNONS!" -- Brak
> > GNUPG Key fingerprint = ACD2 2F2F C151 FB35 B3AF C821 89C4 DF9A 5DDD
> > 95D1
> > GNUPG Key = http://www.enoch.org/mike/mike.pubkey.asc
> > <mime-attachment>--
> > TriLUG mailing list :
> > http://www.trilug.org/mailman/listinfo/trilug
> > TriLUG Organizational FAQ : http://trilug.org/faq/
> > TriLUG Member Services FAQ : http://members.trilug.org/services_faq/
> > TriLUG PGP Keyring : http://trilug.org/~chrish/trilug.asc
> TriLUG mailing list : http://www.trilug.org/mailman/listinfo/trilug
> TriLUG Organizational FAQ : http://trilug.org/faq/
> TriLUG Member Services FAQ : http://members.trilug.org/services_faq/
> TriLUG PGP Keyring : http://trilug.org/~chrish/trilug.asc
More information about the TriLUG