[<prev] [next>] [day] [month] [year] [list]
Message-ID: <011320061921.359.43C7FD9F000183120000016722007614389C0A020708D20D@comcast.net>
Date: Fri Jan 13 19:21:12 2006
From: b.hines at comcast.net (b.hines@...cast.net)
Subject: What is the ulitmate vulnerability ?
On a similair topic,
Wireless home networks; on any given day I can see/break into and use networks that are not my ssid, barring the free internet access, I have stumbled onto the fact that if a user is subscribed to a flat rate service say Vonage and they happen to use wireless for their private network, its quite easy to piggyback free phone service as well. Simplistic in form, not so sophisicated in function, a major flaw in flat rate billing.
b
-------------- Original message --------------
From: K Tucker <ktucker1022@...oo.com>
> I know we all get so exited about some very complex
> and ingenious hack, but sometimes the most simple
> thing can be the biggest problem. So many hotels are
> offering wireless network that beams out all over the
> premises and even out to their parking lot. I am
> surprised how many don't even require a password to
> log on. It is so easy for some teenager that want to
> be the "evil genius hacker" to sit in the parking lot
> and do whatever he likes and be untraceable unless you
> physically catch him in the process. As an Admin I am
> tracing more and more hacks from such locations.
> Whenever I stay at a hotel that has easy access
> wireless, I am taking the time to speak to the
> managers and have had some success in getting them to
> secure things up a little. Of course even the best
> protection in such an environment is not an end all,
> but at least it keeps some of the script kiddies from
> doing harm. I would encourage any Admin that reads
> this to take up the same practice. Thanks
>
> __________________________________________________
> Do You Yahoo!?
> Tired of spam? Yahoo! Mail has the best spam protection around
> http://mail.yahoo.com
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060113/73cb5cb4/attachment.html
Powered by blists - more mailing lists