Conference hacking...
#1
Original Poster




Join Date: Jan 2005
Location: San Francisco, California
Programs: Amex Centurion, United Global Services, Hyatt Globalist, Marriott Titanium
Posts: 919
Conference hacking...
So I'm in a conference in San Francisco today and watching a presentation and some guy sitting in front of me is tryping away on his netbook.
I look a little closer since it looks like he is tooling away in Linux and I can see clearly he is using tcpdump to capture wifi traffic here in the room and keeps trying to snarf mac addresses over-the-air to clone onto his machine and keeps trying different ones he finds to se if it gets him out the hotel network.
Am I too old fashioned that I consider this guy a total tool? Is this something all the cool kids do now and I'm just not so easy going?
I look a little closer since it looks like he is tooling away in Linux and I can see clearly he is using tcpdump to capture wifi traffic here in the room and keeps trying to snarf mac addresses over-the-air to clone onto his machine and keeps trying different ones he finds to se if it gets him out the hotel network.
Am I too old fashioned that I consider this guy a total tool? Is this something all the cool kids do now and I'm just not so easy going?
#2
A FlyerTalk Posting Legend




Join Date: Apr 2001
Location: PSM
Posts: 69,232
#3


Join Date: Nov 2008
Location: NYNY
Programs: Marriott LT Titanium, UA Silver, AA PLT
Posts: 857
There are much simpler ways to do this. There are tools that will do all of that for you.
I think eavesdropping WiFi traffic is pretty tasteless. I SSH tunnel or VPN home for sensitive stuff.
I think eavesdropping WiFi traffic is pretty tasteless. I SSH tunnel or VPN home for sensitive stuff.
#5


Join Date: Oct 1999
Location: Woodside, CA, USA
Programs: United Platinum
Posts: 530
So I'm in a conference in San Francisco today and watching a presentation and some guy sitting in front of me is tryping away on his netbook.
I look a little closer since it looks like he is tooling away in Linux and I can see clearly he is using tcpdump to capture wifi traffic here in the room and keeps trying to snarf mac addresses over-the-air to clone onto his machine and keeps trying different ones he finds to se if it gets him out the hotel network.
Am I too old fashioned that I consider this guy a total tool? Is this something all the cool kids do now and I'm just not so easy going?
I look a little closer since it looks like he is tooling away in Linux and I can see clearly he is using tcpdump to capture wifi traffic here in the room and keeps trying to snarf mac addresses over-the-air to clone onto his machine and keeps trying different ones he finds to se if it gets him out the hotel network.
Am I too old fashioned that I consider this guy a total tool? Is this something all the cool kids do now and I'm just not so easy going?
Go to Defcon one of these years if you want to be truly frightened, but I would NOT recommend using any wireless networking while you're there. WiFi and Bluetooth at Defcon are like walking thru a bad neighborhood late at night wearing a jacket made out of hundred dollar bills. 3G is safer (but still not totally safe).
Bob

