Prev: WPA not working on Japanese windows XP SP2
Next: No connection with WPA PSK - TKIP protection in Vista
From: Falcon ITS on 13 Jan 2010 13:30 On Jan 12, 11:06 am, "zz" <z...(a)zz.com> wrote: > Thanks for the info Lem, appreciate it. Another newb question, can wireless > network monitoring software then track one's wireless activity when say > browsing the internet and sending/receiving personal emails from their own > cell phone device with one's own cell phone carrier? You cell phone can pick up two types of wireless : 1. The type that connects to cell phone towers (I think its GSM but that's not my field). There are tools that just became available to hack the sugnal which has been around since the 80's and is in need of update. So, phone calls and data can be intercepted. 2. Wireless Frequency like B+G which you use to log into hotspots, or home wireless routers also have encryption algorithms that can be hacked. Also, many phone loke BB and IPhone have radios that can use these types of wireless signals. If you, for example, log into you local neighborhood's unsecured wireless, you take the risk that that person has a sniffer and is listening in and looking at your plain text data (ouch!). The same can happen at work, if the IT manager has a gateway device that logs usage (like an IP filter) he can usually track traffic back to your phone. But that all depends on the equipment that is in place. Miguel http://www.falconits.com Computer Service and Support > > "Lem" <lemp40(a)unknownhost> wrote in message > > news:%23zzpBv5kKHA.2160(a)TK2MSFTNGP02.phx.gbl... > > > zz wrote: > >> Sorry newbie question, can wireless networks be detected from a regular > >> wired 'grounded' network machine?...or does the machine your using have > >> to be on a wireless network in order to detect other wireless networks? > >> Thanks in advance. > > > You need a wireless adapter to detect wireless networks. Whether you are > > connected to a network, wired or wireless, is not relevant. > > > Wireless = radio. You need a radio receiver (and a transmitter) to > > interact with a wireless network. > > > -- > > Lem > > > Apollo 11 - 40 years ago: > >http://www.nasa.gov/mission_pages/apollo/40th/index.html
From: zz on 13 Jan 2010 22:34 Thanks also Miguel. Would tethering or use the 'phone as modem' feature on the cell phone device on machine 'A' be detected from another different machine 'B' wireless software monitor and be considered a rogue access point even though machine 'A' like mentioned is using it's own cell phone service's network plan only and not trying to enter the other machine 'B's network? "Falcon ITS" <miguel(a)falconits.com> wrote in message news:0ebedbd6-7c52-4ea4-8882-6bbc213422b9(a)j24g2000yqa.googlegroups.com... On Jan 12, 11:06 am, "zz" <z...(a)zz.com> wrote: > Thanks for the info Lem, appreciate it. Another newb question, can > wireless > network monitoring software then track one's wireless activity when say > browsing the internet and sending/receiving personal emails from their own > cell phone device with one's own cell phone carrier? You cell phone can pick up two types of wireless : 1. The type that connects to cell phone towers (I think its GSM but that's not my field). There are tools that just became available to hack the sugnal which has been around since the 80's and is in need of update. So, phone calls and data can be intercepted. 2. Wireless Frequency like B+G which you use to log into hotspots, or home wireless routers also have encryption algorithms that can be hacked. Also, many phone loke BB and IPhone have radios that can use these types of wireless signals. If you, for example, log into you local neighborhood's unsecured wireless, you take the risk that that person has a sniffer and is listening in and looking at your plain text data (ouch!). The same can happen at work, if the IT manager has a gateway device that logs usage (like an IP filter) he can usually track traffic back to your phone. But that all depends on the equipment that is in place. Miguel http://www.falconits.com Computer Service and Support > > "Lem" <lemp40(a)unknownhost> wrote in message > > news:%23zzpBv5kKHA.2160(a)TK2MSFTNGP02.phx.gbl... > > > zz wrote: > >> Sorry newbie question, can wireless networks be detected from a regular > >> wired 'grounded' network machine?...or does the machine your using have > >> to be on a wireless network in order to detect other wireless networks? > >> Thanks in advance. > > > You need a wireless adapter to detect wireless networks. Whether you are > > connected to a network, wired or wireless, is not relevant. > > > Wireless = radio. You need a radio receiver (and a transmitter) to > > interact with a wireless network. > > > -- > > Lem > > > Apollo 11 - 40 years ago: > >http://www.nasa.gov/mission_pages/apollo/40th/index.html
From: Jack [MVP-Networking] on 14 Jan 2010 13:44 Hi When a telephone is used as a Modem the Tel. transmission to the Cell tower is Encrypted. However once it is fed to a regular computer what ever is going on between the computers is not any more Tel. activity it is regular WIFI, and thus as to be dealt with as mentioned in my previous post. Jack (MS, MVP-Networking). "zz" <zz(a)zz.com> wrote in message news:eGYu8pMlKHA.1540(a)TK2MSFTNGP06.phx.gbl... > Thanks also Miguel. Would tethering or use the 'phone as modem' feature > on the cell phone device on machine 'A' be detected from another different > machine 'B' wireless software monitor and be considered a rogue access > point even though machine 'A' like mentioned is using it's own cell phone > service's network plan only and not trying to enter the other machine 'B's > network? > > > "Falcon ITS" <miguel(a)falconits.com> wrote in message > news:0ebedbd6-7c52-4ea4-8882-6bbc213422b9(a)j24g2000yqa.googlegroups.com... > On Jan 12, 11:06 am, "zz" <z...(a)zz.com> wrote: >> Thanks for the info Lem, appreciate it. Another newb question, can >> wireless >> network monitoring software then track one's wireless activity when say >> browsing the internet and sending/receiving personal emails from their >> own >> cell phone device with one's own cell phone carrier? > > > You cell phone can pick up two types of wireless : > > 1. The type that connects to cell phone towers (I think its GSM but > that's not my field). There are tools that just became available to > hack the sugnal which has been around since the 80's and is in need of > update. So, phone calls and data can be intercepted. > > 2. Wireless Frequency like B+G which you use to log into hotspots, or > home wireless routers also have encryption algorithms that can be > hacked. Also, many phone loke BB and IPhone have radios that can use > these types of wireless signals. If you, for example, log into you > local neighborhood's unsecured wireless, you take the risk that that > person has a sniffer and is listening in and looking at your plain > text data (ouch!). The same can happen at work, if the IT manager has > a gateway device that logs usage (like an IP filter) he can usually > track traffic back to your phone. But that all depends on the > equipment that is in place. > > > Miguel > http://www.falconits.com > Computer Service and Support > > > > > > >> >> "Lem" <lemp40(a)unknownhost> wrote in message >> >> news:%23zzpBv5kKHA.2160(a)TK2MSFTNGP02.phx.gbl... >> >> > zz wrote: >> >> Sorry newbie question, can wireless networks be detected from a >> >> regular >> >> wired 'grounded' network machine?...or does the machine your using >> >> have >> >> to be on a wireless network in order to detect other wireless >> >> networks? >> >> Thanks in advance. >> >> > You need a wireless adapter to detect wireless networks. Whether you >> > are >> > connected to a network, wired or wireless, is not relevant. >> >> > Wireless = radio. You need a radio receiver (and a transmitter) to >> > interact with a wireless network. >> >> > -- >> > Lem >> >> > Apollo 11 - 40 years ago: >> >http://www.nasa.gov/mission_pages/apollo/40th/index.html > > > >
From: Falcon ITS on 25 Jan 2010 08:46 On Jan 13, 10:34 pm, "zz" <z...(a)zz.com> wrote: > Thanks also Miguel. Would tethering or use the 'phone as modem' feature on > the cell phone device on machine 'A' be detected from another different > machine 'B' wireless software monitor and be considered a rogue access point > even though machine 'A' like mentioned is using it's own cell phone > service's network plan only and not trying to enter the other machine 'B's > network? > Hello, Yes, GSM phone data and voice conversations can be intercepted and listened to / intercepted from tower to handset. It requires knowledge and the use of specialized equipment being place in close proximity to the handset. http://www.computerworld.com/s/article/9144898/Researchers_use_PC_to_crack_encryption_for_next_gen_GSM_networks Anybody, anything can be hacked. How much effort/payoff is the question. Choose your paranoia level and plan accordingly. Miguel http://www.falconits.com
First
|
Prev
|
Pages: 1 2 Prev: WPA not working on Japanese windows XP SP2 Next: No connection with WPA PSK - TKIP protection in Vista |