Friday, October 30, 2009

NetStumbler,Cyberspace and Other Network Tools

There are many tools and utilities that can help a Network Administrator. One must know what tools are available, how to use them, and what their legal parameters are.

Stated to the point in a Wiki article (2009),
  • NetStumbler (also known as Network Stumbler) is a tool for Windows that facilitates detection of Wireless LANs using the 802.11b, 802.11a and 802.11g WLAN standards. It runs on Microsoft Windows operating systems from Windows 2000 to Windows XP.
  • Commonly used for:

    • Wardriving
    • Verifying network configurations
    • Finding locations with poor coverage in a WLAN
    • Detecting causes of wireless interference
    • Detecting unauthorized ("rogue") access points
    • Aiming directional antennas for long-haul WLAN links
I find that "unauthorrized ('rogue') access points" refers to access points intended for spoofing.

After searching a little on Wardriving I found that it is the act of recording and then usually mapping Wifi points. It is not piggybacking another person's or entity's network. Which is punishable by law.

Read your state laws for "breaking and entering" in cyberspace at http://www.ncsl.org/IssuesResearch/TelecommunicationsInformationTechnology/ComputerHackingandUnauthorizedAccessLaws/tabid/13494/Default.aspx

An interesting point to consider is that when wardriving with NetStumbler, there is communication between the network and you as a war-driver. Thus, there could be legal issues.
Lets look at some articles that have to do with Network tools like Nmap, Wireshark, and Netstumbler.

Preston (2001) a writer for the Journal of Law and Policy expressed many valid points in 2001, which are still valid today. He extensively cites many court cases including State vs. Allen.
And states that basic defense methods like firewalls "that [prevent] port scans but not nmap-type OS fingerprinting might establish a strong case for liability against a nmap scanner...the cost of preventing nmap-type OS fingerprinting might be found minimal; the court might assign liability only where the defendant used other means to get the information".

Cited List
Related Links

No comments: