Penetration Testing mailing list archives

Re: Where is the Wireless line?


From: Harry Hoffman <hhoffman () ip-solutions net>
Date: Wed, 05 Sep 2007 08:55:11 -0400

Umm, before you go through all of that why don't you walk in and ask to speak with their IT person.

Explain the situation and walk them through the problems. You may find out that they are completely overworked, possibly under-skilled and may appreciate your helping hand.

If they don't it's no skin off of your back.

And yeah... it's wrong (and illegal in some places) to access the network and use their resources (network, printer, toner, paper) without their permission.

You'd think someone from a organization that claims to be "Christian" would already know that stealing is wrong.



Barry Fawthrop wrote:
Hi All

Where does the wireless line being and end with regards to "illegal access"

Concept:

If company A has a wireless network (unprotected) No Encryption,
Broadcasting SSID, Default Acesss point user_name and password.

You know they need security. So is it wrong to
access the network and print to their printer a document
saying "You need security, I just accessed your network"

Or would one have to have permission first!.
I'm not talking about accessing data and files, but using the printer
and printing on their paper that they need help!!!.
And then going in and asking for a security contract having proved
beyond doubt that they need it.

Otherwise before hand it is just your word & experience against theirs
and obviously they are not going to admit they need help without being
shown?

Curious to hear your comments, or possible solutions to the same/similar
 problems??

Thanks
Barry

------------------------------------------------------------------------
This list is sponsored by: Cenzic

Need to secure your web apps NOW?
Cenzic finds more, "real" vulnerabilities fast.
Click to try it, buy it or download a solution FREE today!

http://www.cenzic.com/downloads
------------------------------------------------------------------------


------------------------------------------------------------------------
This list is sponsored by: Cenzic

Need to secure your web apps NOW?
Cenzic finds more, "real" vulnerabilities fast.
Click to try it, buy it or download a solution FREE today!

http://www.cenzic.com/downloads
------------------------------------------------------------------------


Current thread: