lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 2 Jul 2010 11:15:02 -0400 From: Tyler Borland <tborland1@...il.com> To: Vinicius Menezes <cotomax@...oo.com> Cc: full-disclosure@...ts.grok.org.uk, pen-test@...urityfocus.com, Shang Tsung <stsung@...l.com> Subject: Re: WiFi sniffing need to be connected? Login for email seems to be through normal http. Messages will be traveling over plaintext as well. As long as the access point for wireless isn't encrypted, then promiscuous will definitely work and be a much better angle. Best spots for that is hotspots or places that allow unencrypted wifi access, but you have to pay to 'use' it. You also have to be within the capture distance of whomever you're trying to sniff. So hidden extended antennae in backpack might be a good idea. On Thu, Jul 1, 2010 at 10:44 PM, Vinicius Menezes <cotomax@...oo.com> wrote: > > Hello guys, > > I´m trying to snif msn/mail messages throw wifi. > > It´s necessary be connected to one specific station or just set promiscus mode to get all traffic? > > Thanks > > > > > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ > _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists