Penetration Testing mailing list archives

Re: [PEN-TEST] Penetrating Wireless Networks


From: Rafael Coninck Teigao <rafael () SAFECORE NET>
Date: Fri, 9 Mar 2001 15:10:19 -0300

"van der Kooij, Hugo" wrote:

I wouldn't use it this way. If you need security use an IPSEC tunnel from
WS to server.

    I thought about it... What is WS? Anyway, I was thinking to make just the
wireless part encrypted so the mobile client can access anything, even if it
is outside the tunnel.

    []'s,
    RCT.


--
-------------------------------------------------------------------------------
"It is the flawed assumption that security mechanisms can be adequately provided
in layers above the operating system. A perfect security application cannot make
up for flawed or absent security features within the OS kernel. It is the
classic example of building a castle on a swamp. You can build a strong
fortress, but it makes no difference if it slowly sinks into the ground."
        route - Phrack Magazine Volume 8, Issue 54 Dec 25th, 1998, article 06
-------------------------------------------------------------------------------


Current thread: