lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <aa1b49fe0412040009264e1abe@mail.gmail.com>
From: john68945 at gmail.com (question question)
Subject: wireless sniffing question

I have a wireless sniffing question.

Lets say I have a Linksys (or whichever brand you like) wireless
router with a wireless host using 128 bit WEP encryption, and a wired
host connected to the same device.  Obviously it is possible for the
wired box to do various arp attacks on the switch to view other wired
hosts traffic. But does the same apply for the wireless host? Can the
wired host trick the switch on the Linksys into forwarding the
wireless clients packets to him via the regular wire?

Thanks.


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ