Vulnerability Development mailing list archives

RE: Wireless Legality- Netstumbler and kin


From: "ZeroBreak" <ZeroBreak () softhome net>
Date: Fri, 15 Mar 2002 23:57:04 -0500

The frequencies used are all open to the public. This is not to say that
if your computer gets in range and you grab an ip address from their
dhcp server just cause your computer is running, that some lawyer can't
find a way to get you. While netstumbler sends out probes, you could
also use kismet, which is completely passive. It does not send out any
probes, it sits in promiscuous mode and pulls in packets and gives an
output like netstumbler. That goes a step further than netstumbler. Your
card isn't sending anything at all it's just listening.

-----Original Message-----
From: Russell Handorf [mailto:rhandorf () mail russells-world com] 
Sent: Friday, March 15, 2002 4:05 PM
To: Bill Pennington; vuln-dev () securityfocus com
Subject: Re: Wireless Legality- Netstumbler and kin


Would anyone who is a lawyer be willing to comment? :P

At 11:00 AM 3/15/2002 -0800, you wrote:
First off I am not a lawyer :-)
<snip>

russ
==================================
Russell Handorf
oooo, shiney ::Wanders after it::

www.russells-world.com
www.philly2600.net

"Computer games don't affect kids; I mean if Pac-Man affected us as
kids, 
we'd all be running around in darkened rooms, munching magic pills and 
listening to repetitive electronic music."

Kristian Wilson
Nintendo Inc. 1989
==================================



Current thread: