From: DevilsPGD on
In message <pd075691p4j0kj3jva16dmt8judrk1nnga(a)4ax.com> John Navas
<spamfilter1(a)navasgroup.com> was claimed to have wrote:

>On Fri, 30 Jul 2010 15:57:07 -0700, in
><ipl656pres2kcclftlsbq1sdpq8bsdan9a(a)4ax.com>, DevilsPGD
><Still-Just-A-Rat-In-A-Cage(a)crazyhat.net> wrote:
>
>>If you use manufacturer supplied software on your AP then your ability
>>to set limitations are based on the feature set the manufacturer
>>provided. Most APs will only let you allow/deny wireless access based
>>on MAC address (and of course compatible encryption settings)
>>
>>A few will block by hostname, although technically speaking they
>>actually do have to allow the wireless connection first, then once the
>>hostname is known, decide whether to route packets or not.
>>
>>If you control the software on your AP then your ability to code will be
>>your only imagination and coding skills.
>
>The radio has to be on for the AP to do anything useful, which is easily
>detectable no matter what your imagination and coding skills.

Absolutely. However, you can deny access, or fail to reply to scans.

A passive scan will still find you, but I covered that earlier in my
previous message.
From: alexd on
Meanwhile, at the alt.internet.wireless Job Justification Hearings, ArnieJ
chose the tried and tested strategy of:

> Do most PC wifi radios do passive or active scans and what
> exactly is the difference?

The answer to that is similar to with APs; in general using third-party
software will give you more options.

> But how can a receiver detect an AP that is not addressing packets to that
> receiver, which is what a "passive" scan implies?

The chipset in the wifi NIC needs to be able to pass all received data to
the scanning software, ie not just packets sent to it's own MAC address. The
scanning software will then instruct the NIC to hop from channel to channel,
dwelling briefly on each one to listen for traffic. Whatever information can
be extracted from a packet will be used to build a report for the operator
of the software, eg channel, signal strength, SSID, MAC address, IP
addresses if they're not encrypted, etc.

How likely are you to see packets on the air from a wireless network? Very.
If it's not hidden, an AP will be sending beacon frames out regularly. Even
if it is hidden, there will still be regular, non-user-initiated chatter
like ARP requests, AV updates, Windows updates, etc.

> I think with wired network scanners they send out an abbreviated
> packet or some such which are undetectable by many firewalls,
> but not all.

I think you're talking about a port scanner which operates at different
layers to a wireless network sniffer.

http://en.wikipedia.org/wiki/TCP/IP_model

A port scanner isn't really much use when wanting to investigate unknown
wireless networks, because you need to have IP connectivity in order to make
use of it.

--
<http://ale.cx/> (AIM:troffasky) (UnSoEsNpEaTm(a)ale.cx)
11:34:24 up 13 days, 2:05, 6 users, load average: 0.03, 0.09, 0.11
Qua illic est accuso, illic est a vindicatum

From: John Navas on
On Fri, 30 Jul 2010 19:23:35 -0700, in
<ko1756dhlpb6mb41929a2csh82j7lb39n5(a)4ax.com>, DevilsPGD
<Still-Just-A-Rat-In-A-Cage(a)crazyhat.net> wrote:

>In message <pd075691p4j0kj3jva16dmt8judrk1nnga(a)4ax.com> John Navas
><spamfilter1(a)navasgroup.com> was claimed to have wrote:
>
>>On Fri, 30 Jul 2010 15:57:07 -0700, in
>><ipl656pres2kcclftlsbq1sdpq8bsdan9a(a)4ax.com>, DevilsPGD
>><Still-Just-A-Rat-In-A-Cage(a)crazyhat.net> wrote:
>>
>>>If you use manufacturer supplied software on your AP then your ability
>>>to set limitations are based on the feature set the manufacturer
>>>provided. Most APs will only let you allow/deny wireless access based
>>>on MAC address (and of course compatible encryption settings)
>>>
>>>A few will block by hostname, although technically speaking they
>>>actually do have to allow the wireless connection first, then once the
>>>hostname is known, decide whether to route packets or not.
>>>
>>>If you control the software on your AP then your ability to code will be
>>>your only imagination and coding skills.
>>
>>The radio has to be on for the AP to do anything useful, which is easily
>>detectable no matter what your imagination and coding skills.
>
>Absolutely. However, you can deny access, or fail to reply to scans.
>
>A passive scan will still find you, but I covered that earlier in my
>previous message.

And traffic can be sniffed.

--
John

"Assumption is the mother of all screw ups."
[Wethern�s Law of Suspended Judgement]
From: Jeff Liebermann on
On Sat, 31 Jul 2010 02:55:10 +0000 (UTC), ArnieJ
<ArnieJ473(a)hotmail.com> wrote:

>Do most PC wifi radios do passive or active scans and what
>exactly is the difference?

An active sniffer transmits something to the access point, such as a
connection request or broadcast probe request. The AP is expected to
respond. Netstumbler works this way.

A passive sniffer simply listens to the traffic going by. Kismet
works this way.

>I am guessing that active means
>actually sending a packet out for reply.

Correct.

>But how can a
>receiver detect an AP that is not addressing packets to that
>receiver, which is what a "passive" scan implies?

There are directed packets (unicast) and non-directed packets
(multicast). See comments under Active and Passive Scanning at:
<http://trac.kismac-ng.org/wiki/AdditionalInformation>
Note that if the AP does not respond to probe requests, there would be
no way to find or connect to an access point.

>I think
>with wired network scanners they send out an abbreviated
>packet or some such which are undetectable by many firewalls,
>but not all.

Not that I know about.
--
Jeff Liebermann jeffl(a)cruzio.com
150 Felker St #D http://www.LearnByDestroying.com
Santa Cruz CA 95060 http://802.11junk.com
Skype: JeffLiebermann AE6KS 831-336-2558
From: John Navas on
On Sat, 31 Jul 2010 10:26:01 -0700, in
<okm8565q0d1vj9nadksurovknk6a83s6au(a)4ax.com>, Jeff Liebermann
<jeffl(a)cruzio.com> wrote:

>On Sat, 31 Jul 2010 02:55:10 +0000 (UTC), ArnieJ
><ArnieJ473(a)hotmail.com> wrote:

>>But how can a
>>receiver detect an AP that is not addressing packets to that
>>receiver, which is what a "passive" scan implies?
>
>There are directed packets (unicast) and non-directed packets
>(multicast). See comments under Active and Passive Scanning at:
><http://trac.kismac-ng.org/wiki/AdditionalInformation>
>Note that if the AP does not respond to probe requests, there would be
>no way to find or connect to an access point.

If the access point is enabled for a client, all that's needed is to
spoof the MAC of the client, which can be determined by sniffing the
wireless traffic.

--
John

"Assumption is the mother of all screw ups."
[Wethern�s Law of Suspended Judgement]