how-to block ads
3.0 More Definitions
Taken from the movie, "WarGames", where the actor dialed many phone numbers looking for computers to access, called "War-Dialing". The analogy has been applied to wireless. War-walking, war-driving, war-flying refer to the modes of transportation for moving around and identifying various Access Points. Most reports of war-walking, war-driving, and war-flying have resulted in identifying large numbers of wide open unsecure Access Points in most areas.
War-chalking is the act of marking the area or vicinity with a symbol to infer that an AP is within range. WiFi War-chalking Symbols are at »searchmobilecomputing.techtarget ··· ,00.html
Here's another FAQ with relevant info: /faq/wardrive
The SSID differentiates one WLAN from another, so all access points and all devices attempting to connect to a specific WLAN must use the same SSID. Because an SSID can be sniffed in plain text from a packet it does not supply any security to the network.
Each Access Point advertises its presence several times per second by broadcasting beacon frames that carry the ESS name (SSID). Those who have installed NetStumbler on their WiFi-equipped laptops and cruised around town can relate how many SSID's pop up, many of them announcing their location, and whether they are secured or not.
SSID from a security point of view acts as a simple single shared password between base stations and clients, but this should not be considered anything other than a very basic level of security. An SSID can be easily discovered by network sniffing.
With proper configuration, only clients that are configured with the same SSID should communicate with base stations having the same SSID. Knowing the SSID name does not necessarily mean that rogue clients will be able to join the network. It depends on how the network administrator has configured their WLAN, particularly WEP or WPA security.
By default, the SSID is part of the packet header for every packet sent over the WLAN.