Penetration Testing mailing list archives
RE: Wireless Recon with NetStumbler
From: "Eric Smith" <esmith () e-fense com>
Date: Fri, 17 Aug 2001 13:38:25 -0600
Mark, I think your best bet would be to create a seperate configuration profile to be used when you're running NetStumbler. We have a generic profile that has nothing enabled, a blank Network Name and no encryption. In fact, you really don't want to have any of the WEP keys enabled on the card if you're going to be using NetStumbler. The whole point of running the program is to discover any access points that are active, regardless of whether or not they're using WEP. Once you find one that does have WEP enabled, then you can just crack the WEP key and insert it into a different profile (Orinoco allows for up to 4 different profiles), and use that to gain access to their wireless network. That always seems to hammer the point home to the client a little better than using the keys they gave you. Just my .02 Eric Eric Smith, Computer Security and Investigations Specialist e-fense, Inc. (www.e-fense.com) 6767 S. Spruce St., Ste. 215-S Englewood, CO 80112 -----Original Message----- From: Adams, Mark [mailto:markadams () kpmg com] Sent: Thursday, August 16, 2001 11:53 To: 'pen-test () securityfocus com' Subject: Wireless Recon with NetStumbler We are attempting to perform wireless recon for a client but we are having trouble using NetStumbler. We have an Orinoco Gold NIC with legit WEP keys (provided by the client). We connect to the AP and continue to login to the NT domain as normal. We can browse the network all around no problem. We start Netstumbler and it gets the closest AP that we are close to and then the NIC dies. All connectivity is lost. Netstumbler still runs, but it will not find any AP's (because the NIC is dead) Stopping and restarting the PC Card, network service, or doing any ipconfig command does not revive the NIC. We must reboot. The AP is a RoamAbout from Enterasys Networks. By the way, we do not have this problem at their other site. Any ideas? Mark Adams, CISSP markadams () kpmg com ********************************************************************** The information in this email is confidential and may be legally privileged. It is intended solely for the addressee. Access to this email by anyone else is unauthorized. If you are not the intended recipient, any disclosure, copying, distribution or any action taken or omitted to be taken in reliance on it, is prohibited and may be unlawful. When addressed to our clients any opinions or advice contained in this email are subject to the terms and conditions expressed in the governing KPMG client engagement letter. ********************************************************************** ---------------------------------------------------------------------------- This list is provided by the SecurityFocus Security Intelligence Alert (SIA) Service. For more information on SecurityFocus' SIA service which automatically alerts you to the latest security vulnerabilities please see: https://alerts.securityfocus.com/ ---------------------------------------------------------------------------- This list is provided by the SecurityFocus Security Intelligence Alert (SIA) Service. For more information on SecurityFocus' SIA service which automatically alerts you to the latest security vulnerabilities please see: https://alerts.securityfocus.com/
Current thread:
- Wireless Recon with NetStumbler Adams, Mark (Aug 17)
- Re: Wireless Recon with NetStumbler anindya (Aug 18)
- RE: Wireless Recon with NetStumbler Eric Smith (Aug 18)