Home |
Search |
Today's Posts |
|
#1
![]() |
|||
|
|||
![]()
SNIP2SAVE-------
It's about 600 bucks but a Cysco 2400 WiFi with PoE support would do this, however , remoting into a router everytime you want to scour the bands or make an AP change is a bit of a nucense. Thats what turns people to USB Dish and Dongle setups. You can switch AP access on the fly, with the router you have to "Go To Work" sort of speek. It does however benefiet your telnet skills. :-) If I could find a lower end name "Repeater" capable AP point unit like a NetGear or similar and program it to autologon to unprotected WiFi access points That would Kick butt. Thats called promiscuous mode but has moral issues. And another turn off, Two transmitters equalls double the Packet overhead witch converts to half the speed even if you have a strong signal. The KISS methoud always wins for performance in WiFi. I'd like to learn more about why the USB is chosen. Jerry KD6JDJ -- Quote "Get SSL VPN services now, KEEP Government OUT of your business... " |
#2
![]() |
|||
|
|||
![]()
On 06/02/2011 12:36 PM, moronsbegone wrote:
If I could find a lower end name "Repeater" capable AP point unit like a NetGear or similar and program it to autologon to unprotected WiFi access points That would Kick butt. Thats called promiscuous mode but has moral issues. Hello, and moral issues aside for the moment, you'll probably discover very quickly that unlike a few years ago most, if not all, Wi-Fi access points/cable routers in your area these days are probably protected either by WEP (old) or WPA-2. (A Wi-Fi laptop with a network scan utility will usually indicate protected/open networks). And even many of those with older equipment have gotten wise. The newer boxes usually have the protection turned on out-of-the-box with a password (changeable by the user/administrator). Older boxes had WEP turned off by default and a lot of users just plugged them in and never bothered to read the user guide and/or turn on the protection. Sincerely, and 73s from N4GGO, -- J. B. Wood e-mail: |
#3
![]() |
|||
|
|||
![]()
On 06/03/2011 06:43 AM, J.B. Wood wrote:
On 06/02/2011 12:36 PM, moronsbegone wrote: If I could find a lower end name "Repeater" capable AP point unit like a NetGear or similar and program it to autologon to unprotected WiFi access points That would Kick butt. Thats called promiscuous mode but has moral issues. Hello, and moral issues aside for the moment, you'll probably discover very quickly that unlike a few years ago most, if not all, Wi-Fi access points/cable routers in your area these days are probably protected either by WEP (old) or WPA-2. (A Wi-Fi laptop with a network scan utility will usually indicate protected/open networks). And even many of those with older equipment have gotten wise. The newer boxes usually have the protection turned on out-of-the-box with a password (changeable by the user/administrator). Older boxes had WEP turned off by default and a lot of users just plugged them in and never bothered to read the user guide and/or turn on the protection. Sincerely, and 73s from N4GGO, Hello, and I forgot to add that if your objective is to access public Wi-Fi (which is usually unprotected) at a distance then have at it. Sort of like stationary war driving. My previous comments pertained to accessing private/home Wi-Fi nets. Sincerely, -- J. B. Wood e-mail: |
#4
![]() |
|||
|
|||
![]()
Hello once more. One last thing to add is that even if one installs a
high-gain Wi-Fi antenna, depending on the distance to the source, you probably won't have clear line-of-sight and subject to multipath problems. The network might show a "4 green bars" signal strength one moment and be yellow, red, or out the next). Sincerely, -- J. B. Wood e-mail: |
#5
![]() |
|||
|
|||
![]()
"J.B. Wood" wrote in
: Hello once more. One last thing to add is that even if one installs a high-gain Wi-Fi antenna, depending on the distance to the source, you probably won't have clear line-of-sight and subject to multipath problems. The network might show a "4 green bars" signal strength one moment and be yellow, red, or out the next). Sincerely, That is most likely where my problem is. Remember this is just a redneck style Git'r done solution till my commercial one arrives, a vertical anttenna in front of a dish has got all ears and no mouth written all over it. Now if I was using a feed horn [cantenna type] well that would prove tx power and your sugestion as well is the culprit, we know the clutter thing is in there because this whole shmoosh is indoors. I hate running high power $$$ and frequent burnouts of the finals. I like to think a half watt is all I'll need. Now if I can get my TX to look like a Laser beam hey hey. Seriously check this out; www.youtube.com/watch?v=piFISJKyV6c www.youtube.com/watch?v=weEZtBTfEMU The software is free but I preffer the USB dongle os running BackTrack 3 It's a bit simpler, and you need 2 wifi dongles, prefferably the Athros as suggested, II use them on other versions of Linux too, they seem to be the best for hackin around, they are permiscuos and can Inject packets to an already busy data streem thanx to the MAC address spoofabilty they have. You can also use this software to turn a laptop with two dongles into a covert repeater. But expect downtime with that idea. You can Cache everybodys WEP keys buy faking your IP as one of the AP points in the Air. Send all 'packets copy' to a data BIN folder and run the desypher software built in to get the wep, wpk and such. Even SSL ports. It's my job to keep these script kiddies out of my network, I have to know this stuff. Our wireless Credit card system is constantly under attack by NIX kids [wannabe hacker teens running linux] As long as I can crack it, they will not use it, it's sitting there off line collecting dust per order ME!! WEP is not safe neither is WPK, though a data base dictionary service is needed for WPK sometimes for 25 bucks these hackers will take your glop of ssl data and within 1 day send you the security key. This is the nightmare behind CLOUD computing, the access to several hundred micro proccessors to crack a key is now CHEAP, I use 40 lab machines to convert and crunch a DVD 2 hour video in ten minutes with cloud computing software. It's realy FARM computing not quite the same as the term local ads are running such as google is now cloud computing. Unfortunatly Criminal minds are more intrested in this more then we are. |
#6
![]() |
|||
|
|||
![]()
"J.B. Wood" wrote in
: On 06/02/2011 12:36 PM, moronsbegone wrote: If I could find a lower end name "Repeater" capable AP point unit like a NetGear or similar and program it to autologon to unprotected WiFi access points That would Kick butt. Thats called promiscuous mode but has moral issues. Hello, and moral issues aside for the moment, you'll probably discover very quickly that unlike a few years ago most, if not all, Wi-Fi access points/cable routers in your area these days are probably protected either by WEP (old) or WPA-2. (A Wi-Fi laptop with a network scan utility will usually indicate protected/open networks). And even many of those with older equipment have gotten wise. The newer boxes usually have the protection turned on out-of-the-box with a password (changeable by the user/administrator). Older boxes had WEP turned off by default and a lot of users just plugged them in and never bothered to read the user guide and/or turn on the protection. Sincerely, and 73s from N4GGO, Give me 5 minutes and "Back-Track-3" and I can crack a wep key. google backtrack 3 and version 4 and weep!! |
Reply |
Thread Tools | Search this Thread |
Display Modes | |
|
|
![]() |
||||
Thread | Forum | |||
Tower height question (moved thread from tower pro NG) | Antenna | |||
WTB Universal Tower Sections (aluminum tower) | Swap | |||
Tower Wars: FL Citizens Protect the kids from evil Ham with lightening attracting tower. | Policy |