AirSnort sniffing with Orinoco Cold cards
Michael F. March
march at indirect.com
Wed Aug 22 23:19:47 EST 2001
----- Original Message -----
From: "Dominick, David" <David.Dominick at delta.com>
To: "'Matthew Vernon'" <matthew at empire.ucam.org>; "Jussi Vestman"
<vestman at lut.fi>
Cc: <wireless at lists.samba.org>
Sent: Wednesday, August 22, 2001 5:30 AM
Subject: RE: AirSnort sniffing with Orinoco Cold cards
> doesnt AirSnort require the Prusm II chipset to function?
> -----Original Message-----
> From: Matthew Vernon [mailto:matthew at empire.ucam.org]
> Sent: Tuesday, August 21, 2001 9:57 PM
> To: Jussi Vestman
> Cc: wireless at lists.samba.org
> Subject: AirSnort sniffing with Orinoco Cold cards
> Jussi Vestman writes:
> > What kind of experinces do you have with just released
> > AirSnort tool for revealing IEEE 802.11 network password?
> I've not used it. OTOH, the attack is pretty trivial (and an
> implementation has been published), so don't rely on WEP for anything
> at all. I'd use ssh or similar for anything you care about
> "At least you know where you are with Microsoft."
> "True. I just wish I'd brought a paddle."
More information about the wireless