Let'sgoflying!
Touchdown! Greaser!
mmilano said:you're kidding right?
ah, I can see you are getting to know me!
mmilano said:you're kidding right?
Actually, the case I was referring to was in Florida.mmilano said:i believe the guy who got prosecuted and found guilty was in britian and was using the network maliciously.
Ugh, I had the same issue when I was working with a co-worker over the phone.wsuffa said:I was at a friends this weekend. They said "we have put in a wireless thingey, so you can use your laptop". So I fired it up. They said "the network is named 'Home' ".
The wireless driver in the laptop showed three open networks, all labeled "Home".
I hope I got the right one so I won't be thrown in jail.
Brian Austin said:Ugh, I had the same issue when I was working with a co-worker over the phone.
He was setting up his daughter's wireless access point in an apartment building with a LOT of college students in it. He couldn't seem to get a good signal strength, even though he was only a few feet from it. Turned out there were FOUR wireless networks, all with the default SSID, and he hadn't changed the default anything on this access point. None of them were password protected from the manufacturer's defaults. How do I know? We ended up connecting to his via cable because, after reconfiguring it twice, he told me it kept switching back to defaults. Uh....no....not really. In reality, he changed TWO of the other wireless access points to what he wanted for his daughter's!
I suspect there were some ticked off neighbors in that building.
mmilano said:i've heard mixed opinions on this, but what do you guys think. is it legal for me to setup a sniffer on my network and capture my neighbors data who are stealing my bandwidth? (known as a honeypot) .. one could argue that it is simply intrusion detection and network security. it's not the law i'd be fearing most when using un-secured wireless networks.
http://en.wikipedia.org/wiki/Honeypotmmilano said:huh? leaving your wireless network unsecured for the purpose of intentionally capturing packets constitutes a honeypot. i suppose my legal question would come down to proof of the intent. i don't understand your correction. i also work in the industry.
a honeypot could also be something as simple as links on a website to capture webcrawlers who are not obeying robots.txt too.
It never went to court after I gave the prosecutor everything I found. My understanding (hearsay, mind you) was that when the technical details of how he did what he did started coming out, he realized he had been nailed and started talking for a deal. Part of the settlement was no details discussed.mmilano said:what kind of cases were those that you worked on? were you called in as an 'expert witness' or something?
oh so you did the investigation part, .. that would be funBrian Austin said:It never went to court after I gave the prosecutor everything I found.
I'd trust SANS over Wiki. If you have nothing to target, how can you have a honeypot?mmilano said:yes, read the whole wikki article and you will see both of us are correct .. even though you are still correcting me.
The intention of the baiter is used as a legitimacy argument, however. The court case I mentioned was a corporation, not a law enforcement agency. They brought in the FBI, iirc, AFTER the honeypot had been breached.mmilano said:in reality it is someone setting up bait for someone else to take. it doesn't matter if the baiter is white or black, or if even what the bait is.
Discussing how a hacker thinks wasn't your original post, however:mmilano said:for #3 - are you serious? i'm a software engineer working on enterprise level network security software. discussing it, or educating people on how a hacker thinks is the best way to educate about security.
Personally, I'd be more worried about missing something in the sniffer logs that would bite me later. Unless you've got a SNORT box running with all the definitions enabled and active response of some sort, you run the risk of leaving your network open for someone else to use as a conduit for attacks. I've seen that one, too, and as far as I'm concerned, the guy got away with it. No logs, no response, on the office network he was using (I was brought in to test the vulnerability and see if any "forensic evidence" was available). The only way they got him was with an accidental parking lot camera capture. His laptop screen lit up his face! He was only charged with trespassing from what I heard.mmilano said:i've heard mixed opinions on this, but what do you guys think. is it legal for me to setup a sniffer on my network and capture my neighbors data who are stealing my bandwidth? (known as a honeypot) .. one could argue that it is simply intrusion detection and network security. it's not the law i'd be fearing most when using un-secured wireless networks.
It is. I'd like to do it full time but LE doesn't pay well enough (and they have some fairly outdated tools). The occasional gig on the side is fun, though.mmilano said:oh so you did the investigation part, .. that would be fun
you mis-read or seemed to take it that way with your posting on a public forum advice.Discussing how a hacker thinks wasn't your original post, however:
mmilano said:you're kidding right? maybe in the movies.
He was a smart guy who investigated the network he wanted to breach. He wouldn't say one way or the other on how he knew (at least in anything I saw or heard) but he picked one where nothing was logged and security was minimal. The flippin' administrator password for the local box was BLANK for crying out loud. These guys had been almost asking for it. I told the prosecutor as much, too.mmilano said:parking lot camera! lol ... i don't know the details, but it would be hillarious if he was using some very creative ways to hide his tracks all to get caught on a security camera located on the property!
mmilano said:parking lot camera! lol ... i don't know the details, but it would be hillarious if he was using some very creative ways to hide his tracks all to get caught on a security camera located on the property!
No, this was a local one I worked on. Nothing that noticeable.Let'sgoflying! said:You guys must be talking about the Lowe's case?
http://www.law.com/jsp/article.jsp?id=1103138408230
woodstock said:did you change your network name to GO AWAY or shame shame or something? haha