Penetration Testing mailing list archives

Re: [PEN-TEST] Penetrating Wireless Networks


From: "Clarke, Matthew J" <CLARKE06 () MORRISVILLE EDU>
Date: Fri, 9 Mar 2001 10:53:12 -0500

I have a raylink wireless access point in my home, it provides access for up
to 500 feet, are there any known vulns for this system? i know nothing about
it.

SSR 8000 System Software, Version 3.0.1.1
Copyright (c) 1996-2000 Cabletron Systems, Inc.
System started on 2001-01-21 15:09:34

-----Original Message-----
From: Penetration Testers [mailto:PEN-TEST () SECURITYFOCUS COM]On Behalf
Of Rafael Coninck Teigao
Sent: Thursday, March 08, 2001 1:00 PM
To: PEN-TEST () SECURITYFOCUS COM
Subject: Re: [PEN-TEST] Penetrating Wireless Networks


After reading the faq, I started thinking:
    wouldn't be easier to just use some kind of software encryption,
like IP-Sec?

    Please, correct me if I'm wrong, but I think it would be possible to
set software on the gateway at the base station and on the mobile
machine to encrypt the hole traffic. After all, AFAIK, the wireless
device works solely as a bridge.

    What do you guys think?

    []'s,
    RCT.

--
----------------------------------------------------------------------------
---
"It is the flawed assumption that security mechanisms can be adequately
provided
in layers above the operating system. A perfect security application cannot
make
up for flawed or absent security features within the OS kernel. It is the
classic example of building a castle on a swamp. You can build a strong
fortress, but it makes no difference if it slowly sinks into the ground."
        route - Phrack Magazine Volume 8, Issue 54 Dec 25th, 1998, article
06
----------------------------------------------------------------------------
---


Current thread: