Both strong on channel 7.
They share 15 identical clients.
I see a little more than twice as many packets on Network A as on Network B.
I've stripped all but the trailing identifiable digits, for privacy.
IP Range: 192.168.1.9 (through ARP)
IP Range: 192.168.1.9 (through ARP)
Unfortunately, the network is not mine, and I'm practising on my own behest, so I can't deauth a client.
I'd like to be able to set up a similar network locally to attack actively, or to be able to passively determine the SSID of the ...3C:81 network. Preferably both.
The SSID ...1332 indicates that it is a popular residential ISP, but 15 clients is unusual. In fact, I didn't think that the default modems they shipped could support that many.
I've been playing with kismet for a couple of days now, and concentrating on channel 7 for the last day, and this is the only thing I don't understand so far.
If anyone could tell me what's going on, and maybe a few keywords I can google, it would be very helpful.
A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.
in my opinion streaker, i dont see that he's doing anything wrong. since he's only sniffing traffic.
however, it's the moderators task to see if he's doing something illegal or not.
Aquillar> hey, you guys ever play kmem russian roulette?
Agnostos> I don't believe I have. care to explain the details?
Aquillar> dd if=/dev/urandom of=/dev/kmem bs=1 count=1 seek=$RANDOM
Aquillar> keep executing until system crashes
Aquillar> person that crashes system has to buy beer
Agnostos> I wonder if I can sneak that into a server startup script here.
Please stay away from networks which you do not own or are not authorized to engage.Unfortunately, the network is not mine, and I'm practising on my own behest, so I can't deauth a client.
The highlighted portion is the only thing that saved you from a ban.
Thanks and excuse me.
I had no idea that this was illegal or even ethically questionable.
I rather thought of it as learning a language by sitting in a cafe and tuning in to loud greetings but not conversations; that I would encounter configurations in the field that may not occur to me with my own router.
I won't even sneak in a final question about what was actually going on.
Back to sniffing my own network...
I've been trying to get all the SSIDs and their strengths in my area with a directional antenna and then move my computer over to my friend's house and do the same and then compare them to triangulate approximate positions of businesses and compare them to a map of the area.
Is this a) legal and b) ethical?
I ask because this is a new field to me and I may not yet know what is acceptable behaviour.
I guess "stay away from networks which you do not own or are not authorized to engage" means I have to stop...
If someone threw their open letters onto my lawn I'd probably be able to see what is going on there as well, it's not like I'm activly touching these letters, nor am I seeking them out, they are just there. A more accurate example would be getting arrested for wiretapping because someone was talking on their mobile phone in the middle of a crowd.
The OP might want to look into WDS for his own network needs, the double packet rate suggests some sort of joining/reflection.
Still not underestimating the power...
There is no such thing as bad information - There is truth in the data, so you sift it all, even the crap stuff.