lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <1084323001.2133.29.camel@maverick.home.gargiullo.com> From: mgargiullo at warpdrive.net (Michael Gargiullo) Subject: Wireless ISPs On Tue, 2004-05-11 at 17:01, amilabs wrote: > I have been researchign the wisp industry and I am planning to start one > also. I assure you that most use some form of authentiction and enctyption. > I would be very bad business to leave it open not only for hacking and dos, > but also for users gaining free access. Most WISP gear supports wep and aaa > type systems. We used to offer Wireless Local Loops (1.5Mbps up and Down). The equipment was from breezenet. Radios were about $900 a piece, but they freq hopped, and were damn near to sniff effectively. They do however run on the same 802.11b channels. While sniffing our signal, I was across from a local hospital. I was assigned an IP on the 10.100 network (Not ours)... Curiosity got me... I was in the Emergency Rooms WAP. I went to their IT Dept, and showed a very red faced IT manager. Someone got fired over that little mess. Their system was webbased patient tracking...http not https(duh). I moved down the road to "warehouse size home improvment store" (to make sure I wasn't receiving the hospital garbage)... got more junk... something that looked a lot like cash register data...over unsecured wireless. If it's wireless... it's more then likely wide open. Do I run wireless at home...yup... Am I too lazy to run WEP...yup. So I run my wireless gear in the DMZ... and chalked my sidewalk.
Powered by blists - more mailing lists