10-20-2003 03:07 PM - edited 07-04-2021 09:05 AM
Iam interested see what practices you take against war driving on cisco WLAN devices. Not looking for answear as to what can be done to prevent unauthorized use of your AP, but what can be done to stop its detection with popular war driving tools.
Will dissabling "Guest Access" SSID be enough to stop the broadcasting beacons popular scanners like Netstumbler is looking for in order to make a match? Or will it still be detected.
10-27-2003 06:29 AM
So far they have for us.
10-28-2003 09:33 AM
Hi, I am just curious, what threat do you consider war-driving presents?
As long as you network is secured, what harm is there in allowing it to be detected?
Allowing the network to be detected
-- enables authorized users easily find it
-- allows neighbouring installations to detect and avoid using the same channels in adajacent APs
-- ensures 802.11 standards compliance
Having said that, it is fairly easy to turn off broadcast SSID, and that will prevent most casual wardrivers from seeing it. However any determined hacker can easily detect WLAN traffic, and then sniff for a probe-request/response in which the SSID is transmitted in the clear. there is currently no way to hide the SSID from from probe-request/responses.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide