Wireless Security
Kismet Fingerprinting Apr 07 2009 02:42PM
Jon Janego (jonjanego gmail com) (1 replies)
Re: Kismet Fingerprinting Apr 08 2009 05:34AM
Cedric Blancher (blancher cartel-securite fr)
Le mardi 07 avril 2009 à 09:42 -0500, Jon Janego a écrit :
> I would imagine that for the factory config, it's just a matter of
> looking at the SSID and visible IP ranges, but is there anything more
> to it than that??

Looking at MAC address to determine vendor, SSID and security
configuration.

> And encryption method must have to witness a key exchange, or look at
> the vendor-specific tags broadcasting the capabilities of the AP.

Encryption capabilities are read in WPA/WPA2 Information Element (IE).
That's fully standard compliant, and can be read in beacons and probe
answers, the exact same way your computer knows what security a given AP
is requiring.

--
http://sid.rstack.org/
PGP KeyID: 157E98EE FingerPrint: FA62226DA9E72FA8AECAA240008B480E157E98EE
>> Hi! I'm your friendly neighbourhood signature virus.
>> Copy me to your signature file and help me spread!

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus