From: John Navas on
On Fri, 12 Feb 2010 16:23:00 +0000, Bob <bob(a)invalid.invalid> wrote in
<LJ6dndEYN_n5HejWnZ2dnUVZ8uadnZ2d(a)bt.com>:

>On 12/02/2010 16:15, John Navas wrote:
>
>> So what? It's misuse of a term of art.
>>
>Twaddle
>In no way does it engage my senses or emotions.

Your problem, not mine.

--
Best regards, FAQ for Wireless Internet: <http://wireless.navas.us>
John FAQ for Wi-Fi: <http://wireless.navas.us/wiki/Wi-Fi>
Wi-Fi How To: <http://wireless.navas.us/wiki/Wi-Fi_HowTo>
Fixes to Wi-Fi Problems: <http://wireless.navas.us/wiki/Wi-Fi_Fixes>
From: fufu on
Bob <bob(a)invalid.invalid> wrote in
news:icednYGIfrEjrujWnZ2dnUVZ8sOdnZ2d(a)bt.com:

> Meraki have produced a browser based sniffer
> <http://meraki.com/tools/stumbler/>
>
> Frequently Asked Questions
>
> Q: What is the WiFi Stumbler?
>
> A: The WiFi Stumbler is a browser-based wireless scanner tool
that
> detects 802.11 wireless networks and displays useful information
about
> the networks in an easily searchable, intuitive web interface.
WiFi
> Stumbler can be used to optimize wireless network coverage,
> troubleshoot performance issues, detect rogue APs and perform
basic
> pre-deployment site surveys.
>
> Q: Can I use WiFI Stumbler when I am not connected to the
Internet?
>
> A: If your browser supports offline mode (currently only
Firefox),
> then it can load WiFi Stumbler from its offline cache. This means
that
> WiFi Stumbler will work in these browsers even when you are not
> connected to the Internet, as long as your wireless card is
enabled.
> Simply visit the Stumbler page using Firefox once you are
connected to
> the Internet. The site will ask for permission to use offline
storage.
> Grant this permission, bookmark the page and you can revisit
whenever
> you need to use WiFi Stumbler.
>
> Q: How does the WiFi Stumbler work?
>
> A: WiFi Stumbler captures data about nearby wireless networks
from
> your computer's wireless card and displays it as a web page. It
can
> even work when you are not connected to the Internet if your
browser
> supports offline mode (currently Firefox only).
>
> Q: Why is Stumbler a web-based tool instead of standalone,
> downloadable software?
>
> A: By running in a browser, there is no need to download
software to
> your computer. This makes it very easy to load and use since no
> software installation is required. It also can run on either a PC
or
> Mac, unlike most downloadable software applications. In addition,
as
> we will be continually adding new features to Stumbler, you will
> automatically get the latest version of the tool each time you
reload
> the page.
>
> Q: The WiFi Stumbler doesn't load on my computer/in my browser.
Why
> not?
>
> A: WiFi Stumbler requires Java support and does not currently
> support
> Linux. If your browser does not support Java or you are running
Linux
> and you try to load WiFi Stumbler, you will receive an error
message
> in your browser window. Currently, Google Chrome for Mac does not
> support Java so it will not run WiFi Stumbler. WiFi Stumbler is
also
> currently a beta stage tool; if you encounter other problems
getting
> Stumbler to load, please let us know using the Make a Wish box at
the
> bottom of the page.
>

Seems to me using this would risk privacy invasion on the part of
those "sniffing" your data. Certainly could not use with anything
that might contain a transmitted password or other personal data.
Guess I really do not understand just what the usefulness of this
would be other than trying to hack unauthorized connections. Maybe
to troubleshoot local networks.
From: John Navas on
On Fri, 12 Feb 2010 19:33:38 +0000 (UTC), fufu
<fufu(a)Use-Author-Supplied-Address.invalid> wrote in
<45de8120d348be70e7b3afbc11340c70(a)tioat.net>:

>Bob <bob(a)invalid.invalid> wrote in
>news:icednYGIfrEjrujWnZ2dnUVZ8sOdnZ2d(a)bt.com:

>Seems to me using this would risk privacy invasion on the part of
>those "sniffing" your data. Certainly could not use with anything
>that might contain a transmitted password or other personal data.
>Guess I really do not understand just what the usefulness of this
>would be other than trying to hack unauthorized connections. Maybe
>to troubleshoot local networks.

There's no privacy issue. It's a Site Survey tool. See
<http://wireless.navas.us/wiki/Wi-Fi_How_To#Why_and_How_to_do_a_Site_Survey>

--
Best regards, FAQ for Wireless Internet: <http://wireless.navas.us>
John FAQ for Wi-Fi: <http://wireless.navas.us/wiki/Wi-Fi>
Wi-Fi How To: <http://wireless.navas.us/wiki/Wi-Fi_HowTo>
Fixes to Wi-Fi Problems: <http://wireless.navas.us/wiki/Wi-Fi_Fixes>
From: Jeff Liebermann on
On Fri, 12 Feb 2010 19:33:38 +0000 (UTC), fufu
<fufu(a)Use-Author-Supplied-Address.invalid> wrote:

>Seems to me using this would risk privacy invasion on the part of
>those "sniffing" your data.

Sniffing is much like looking in a phone directory for someones
address. Just because you know where they live, doesn't magically
give you access to what's inside their house. It's the same with
wireless. The MAC addresses are all send in the clear and not
encrypted. That's like your address and is generally considered
public information. What's not available are the constents of the
encrypted data packets, which contain all kinds of interesting
information that might result in a privacy leak. As long as the
encryption is functional and unbroken, there's no privacy invasion
possible.

>Certainly could not use with anything
>that might contain a transmitted password or other personal data.

Actually, I've found two wireless lans that also used the SSID as
their WPA password. I found one and explained to the semi-intoxicated
owner what was happening. He claimed he understood, but it's still
unchanged about 6 months later. Oh well.

>Guess I really do not understand just what the usefulness of this
>would be other than trying to hack unauthorized connections. Maybe
>to troubleshoot local networks.

1. Check of interference on specific channels. There are only 3
non-overlapping channels (1, 8, 11). The trick is to find a channel
that's NOT being used for your LAN. If not, start thinking about
5.7Ghz. 802.11a.
2. Track down the source of Wi-Fi interference.
3. Identify users of junk wireless routers and try to sell them
something better. I've tried this a few times with mixed results.
4. Collect traffic statistics (error rate, retransmissions, etc).
5. Find the dingbat with the new MIMO router that's hogging the
entire 2.4GHz band with a 40Mhz wide HD video feed so that he doesn't
have to run an HDMI or ethernet cable 10 ft across his living room.
I've already given away one ethernet cable to get one of these off the
air.
6. Identify potential municipal Wi-Fi or mesh network nodes for
internet access.
7. Find the idiot with the 1 watt power amplifier trying to drill
through 5 brick walls to his router.
8. Whatever else I forgot.
--
Jeff Liebermann jeffl(a)cruzio.com
150 Felker St #D http://www.LearnByDestroying.com
Santa Cruz CA 95060 http://802.11junk.com
Skype: JeffLiebermann AE6KS 831-336-2558
From: me here on
Jeff Liebermann wrote:

> On Fri, 12 Feb 2010 19:33:38 +0000 (UTC), fufu
> <fufu(a)Use-Author-Supplied-Address.invalid> wrote:
>
> > Seems to me using this would risk privacy invasion on the part of
> > those "sniffing" your data.
>
> Sniffing is much like looking in a phone directory for someones
> address. Just because you know where they live, doesn't magically
> give you access to what's inside their house. It's the same with
> wireless. The MAC addresses are all send in the clear and not
> encrypted. That's like your address and is generally considered
> public information. What's not available are the constents of the
> encrypted data packets, which contain all kinds of interesting
> information that might result in a privacy leak. As long as the
> encryption is functional and unbroken, there's no privacy invasion
> possible.
>
> > Certainly could not use with anything
> > that might contain a transmitted password or other personal data.
>
> Actually, I've found two wireless lans that also used the SSID as
> their WPA password. I found one and explained to the semi-intoxicated
> owner what was happening. He claimed he understood, but it's still
> unchanged about 6 months later. Oh well.
>
> > Guess I really do not understand just what the usefulness of this
> > would be other than trying to hack unauthorized connections. Maybe
> > to troubleshoot local networks.
>
> 1. Check of interference on specific channels. There are only 3
> non-overlapping channels (1, 8, 11). The trick is to find a channel
> that's NOT being used for your LAN. If not, start thinking about
> 5.7Ghz. 802.11a.
> 2. Track down the source of Wi-Fi interference.
> 3. Identify users of junk wireless routers and try to sell them
> something better. I've tried this a few times with mixed results.
> 4. Collect traffic statistics (error rate, retransmissions, etc).
> 5. Find the dingbat with the new MIMO router that's hogging the
> entire 2.4GHz band with a 40Mhz wide HD video feed so that he doesn't
> have to run an HDMI or ethernet cable 10 ft across his living room.
> I've already given away one ethernet cable to get one of these off the
> air.
> 6. Identify potential municipal Wi-Fi or mesh network nodes for
> internet access.
> 7. Find the idiot with the 1 watt power amplifier trying to drill
> through 5 brick walls to his router.
> 8. Whatever else I forgot.

This java script really only displays the same information as the wifi
adapter does when set to scan - it's a bit of a con really - and
certainly no more of a privacy issue than the basic adapter software.

Not much to get excited about.