Ethereal-users: [Ethereal-users] ethereal and wireless

Note: This archive is from the project's previous web site, ethereal.com. This list is no longer active.

From: "Lehrer, Neil (OIG/OAS)" <nlehrer@xxxxxxxxxxx>
Date: Thu, 26 Jun 2003 15:58:25 -0400
this was in an article at http://www.airdefense.net/eNewsletters/June03/feature.shtm

"Netstumbler can show the hacker where the open networks are and if they have encryption turned on. If encryption is not available, the hacker can open the Windows WLAN configuration tool and select the open network they wish to view.

Wireless Hacking: A Gateway to Your Enterprise Network
Once the hacker is attached the access point, they are now inside the network where a valid TCP/IP address is given to them. If the target network has Internet access, the hacker can access and download any resources they want, such as movies, music, pornography, stolen software and many more. A sophisticated hacker can launch an attack against other networks since their activity will be traced back to the target network.

The hacker can run Ethereal and immediately gather all traffic broadcasted by the network.This data could contain sensitive company documents, such as emails, usernames, passwords, corporate email accounts and passwords of corporate servers. 
With usernames and passwords, the hacker can log on to the user's email account and send embarrassing emails or spam that can appear to come from any employee."


i thought that ethereal could not read the 802.1x traffic?



regards 
--------------------- 
Neil Lehrer 
manager 
HHS/OIG/OAS 
202 205-4339 
This e-mail may contain confidential and/or privileged information. If you are not the intended recipient (or have received this e-mail in error) please notify the sender immediately and destroy this e-mail. Any unauthorized copying, disclosure or distribution of the material in this e-mail is strictly forbidden.