[vox-tech] sniffing wireless packets / war driving
Charles McLaughlin
vox-tech@lists.lugod.org
Thu, 12 Jun 2003 11:51:25 -0700 (PDT)
Ok... I know what your thinking. No, I'm not trying to crack someone's
WLAN. I just moved and am just curious if any WLANs are near by. At my
old apartment complex, I was able to use my neighbor's DSL connection from
his wireless basestation. He didn't even enable WEP, so I couldn't help
but use his signal -- my laptop automatically recieved an IP address from
his basestation!
Now... I've moved and am just curious what signals are out there. I'm
using Kismet to sniff wireless packets. I guess this is legal because I
haven't actually "circumvented" any encrypted packets. ;-)
Using Kismet, I can see an infastructure type signal, which I assume is
a neighbor's WLAN basestation. I've let Kismet run for two days
and have sniffed almost 80,000 packets, but none of them have been encrypted.
When I look at the WLAN using a Winbloze box, I'm asked for a WEP key.
My conclusion is that my neighbor's basestation is using WEP, but
s/he hasn't booted any wireless clients in the past two days. Maybe that
is why none of the packets are encrypted?
Maybe I should mention that I don't know much about networking "theory" --
I'm more of a hands-on type of guy, so I hope this post makes sense.
Thanks for any insight,
Charles