Re: Walmart using WEP

From: Craig Van Tassle (craig@codestorm.org)
Date: Mon Jul 31 2006 - 22:37:29 EDT


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Well one issue would be taking over one of the scanner's MAC address and then
you get control. Also it does give you access to the network at Walmart. While I
think it would be best to implement a VPN under the WEP encryption I don't think
they do it. Also Cracking WEP keys (IIRC) is illegal, its getting access to data
that you don't have permission to access. That is the illegal part. I'm sure if
you went to Walmart and sat down with Kismet running they would have an issue
with that, I know I would.

jeff@downtowndevelopmentplan.com wrote:
> On Fri, Jul 28, 2006 at 01:13:25PM -0700, Gary Nichols wrote:
>
>> Is this reckless?: It would appear that Walmart is using 802.11 networking
>> and WEP on their inventory scanners. This could be bad if someone cracked
>> the WEP key. Not a very good security practice.
>
> I don't see how cracking the WEP key used by their inventory scanners is
> synonymous with being able to adjust their inventory. While it may
> represent the failure of one layer of security, it is still just one
> layer.
>
> Jeff
>
>
> ------------------------------------------------------------------------------
> This List Sponsored by: Cenzic
>
> Concerned about Web Application Security?
> Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
> Choice Award from eWeek. As attacks through web applications continue to rise,
> you need to proactively protect your applications from hackers. Cenzic has the
> most comprehensive solutions to meet your application security penetration
> testing and vulnerability management needs. You have an option to go with a
> managed service (Cenzic ClickToSecure) or an enterprise software
> (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
> help you: http://www.cenzic.com/news_events/wpappsec.php
> And, now for a limited time we can do a FREE audit for you to confirm your
> results from other product. Contact us at request@cenzic.com for details.
> ------------------------------------------------------------------------------
>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFEzr5pAOTIJ89W4sIRAo7yAKDm4+51zAqcCyX7j4tbTcdu/+shZwCaAsaN
DrVNomCXon5VbvWN692Lxsw=
=14Cu
-----END PGP SIGNATURE-----

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
Choice Award from eWeek. As attacks through web applications continue to rise,
you need to proactively protect your applications from hackers. Cenzic has the
most comprehensive solutions to meet your application security penetration
testing and vulnerability management needs. You have an option to go with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request@cenzic.com for details.
------------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:56:29 EDT