Security Basics mailing list archives

RE: Wireless Security


From: "Drumm, Daniel" <dgdrumm () bf umich edu>
Date: Wed, 19 Oct 2005 09:02:59 -0400

Kevin,

Can you cite any caselaw to back up your assertion that an active scan
(fingerprinting, or even an active hack against the intruder) has proven
to be outside the bounds of that jurisdiction? I would be interested in
any precendent being set here. 

 

-----Original Message-----
From: Kevin Reiter [mailto:tux () penguinnetwerx net] 
Sent: Monday, October 17, 2005 3:54 PM
To: hfebelingjr () lycos com
Cc: security-basics () securityfocus com
Subject: Re: Wireless Security

Herman Frederick Ebeling, Jr. wrote:
<large snip>

====> I would have to think that one should/would be able to go in to
various
computers that are illegally hooked to their network in order to
determine the
identity of those who are using his/her network illegally.

Wrong.  Even if they're not authorized to be on your network, that 
doesn't automagically give you permission to invade their system. 
Scanning packets and doing non-invasive queries is OK, but anything 
other than passive scanning/listening would also be illegal on your (the

network owner's) part.  Your best bet at that time would be to block 
their MAC, or take other actions on your side that would deny them 
access to _your_ network.

<snip>

-Kev


Current thread: