said by Lazlow:1st. If you had bothered to look up war driving you would have seen that it is not illegal. The groups often get together and have competitions. Some are how many APs you can find in a given period of time(usually tied in with gps for proof). Another game is similar to geocaching where clues are left on essids. Some games do step over the line (as in not legal) and actually access the AP.
I would still air on the side of caution for that.
Even DSLR even says its both: »
Wireless Security »
Isn't wardriving illegal?Now, I don't know about you, but I certianly don't want people sniffing around my APs.
said by Lazlow:From your almost total lack of knowledge on the subject I am not surprised that you cannot find anyone. Do you even no the basic symbols to look for?
Personal attacks will only make your argument weaker.
said by Lazlow:Once again the hardware requirements are really minimal. A 700Mhz PIII is sufficient, especially if one can use the pre made tables. Virtually all the software (windows or Linux) provides a list of cards that are best to get the job done. Again many of these cards are in the $20 range, so it is within reach of virtually anyone.
"WPA uses the passphrase you provide and the ESSID as a seed to create the actual encryption key."
From:»
www.fonerahacks.com/foru ··· =4&t=158Which was just the first reference I happened to find.
I would love to accept that as actual fact, however, the whois for that domain is as follows:
nguyen, eric webmaster@fonerahacks.com
asdf
asdf
asdf, Kansas 31241
United States
1234124123 Fax --
Somehow, I cannot take that as a reliable source, and I think you would agree. It may be true that WPA uses ssid, however, by posting illegitimate sources you only weaken any argument you make even further.
Though, in general terms WPA isn't itself an encryption used - it uses different encryption algorithms as a backbone; one of them is TKIP.
»
en.wikipedia.org/wiki/Te ··· ProtocolHere is the TKIP overview: »
libtomcrypt.com/files/tkip.pdfThere is NO mention of using essid.
With that said, the router could use the essid in forming keys BUT it isn't a fact that they will; so you shouldn't assume they will.
said by Lazlow:A simple google search on howto X, will yeild a step by step guide on how to do this. Most include the software and hardware requirements required to get the job done.
No doubt there, however, I would bet that most people don't have the hardware on hand.
said by Lazlow:I think you are vastly underestimating the number of people who are now using Linux. While Linux may be the preferred platform, the software to do this is also available for windows.
I don't think so. I am arguably the only person in my school that actually uses Linux on a day-to-day basis. The rest, complain of its complicatedness (is that a word?, regardless it isn't a good excuse not to use Linux), and are too attached to Windows to actually use Linux.
Yes, I have heard the complaints and queried people on what they use. The general consensus is Windows.
And when I tried to utilize the necessary software under Windows, I couldn't get it to work. Booted up Linux and it worked perfectly.
said by Lazlow:Our local Walmart carries three usb dongles that have the proper chipsets to use for this activities.
Care to share specs?