RE: Where is the Wireless line?

From: adam.slader@bt.com
Date: Wed Sep 05 2007 - 08:57:37 EDT


Barry,

Is there any difference of breaking in if the door is unlocked to if the
door was bolted?

Who knows...

My opinion is people usually happy to be told that they have left their
door open by someone other than a burgler. Why not just tell them rather
than the movie scenario (although watching a printer doesn't make good
tv).

-----Original Message-----
From: listbounce@securityfocus.com [mailto:listbounce@securityfocus.com]
On Behalf Of Matt Steer
Sent: Wednesday, September 05, 2007 1:33 PM
To: Barry Fawthrop
Cc: pen-test@securityfocus.com
Subject: RE: Where is the Wireless line?

Barry,

I am not a Lawyer or knowledgeable to the full extent of the law.

In the UK it is illegal to connect to an access point to do not have
permission to use. I suppose it depends where you are, though I would
not recommend taking the actions you specified.

A printer is a company resource just like files and data. (Think how
*nix represents hardware as a file)

Perhaps knock the door and outright tell an IT representative?

In my opinion, at the end of the day if you have no affiliation with the
company, it's not your problem and taking advantage of the current
situation could cause trouble for you even if you have good intentions.

Hope this helps and is accurate!

Other opinions please!

Regards,
 
Matt Steer

 
-----Original Message-----
From: listbounce@securityfocus.com [mailto:listbounce@securityfocus.com]
On Behalf Of Barry Fawthrop
Sent: 05 September 2007 02:57
To: pen-test@securityfocus.com
Subject: Where is the Wireless line?

Hi All

Where does the wireless line being and end with regards to "illegal
access"

Concept:

If company A has a wireless network (unprotected) No Encryption,
Broadcasting SSID, Default Acesss point user_name and password.

You know they need security. So is it wrong to access the network and
print to their printer a document saying "You need security, I just
accessed your network"

Or would one have to have permission first!.
I'm not talking about accessing data and files, but using the printer
and printing on their paper that they need help!!!.
And then going in and asking for a security contract having proved
beyond doubt that they need it.

Otherwise before hand it is just your word & experience against theirs
and obviously they are not going to admit they need help without being
shown?

Curious to hear your comments, or possible solutions to the same/similar
problems??

Thanks
Barry

------------------------------------------------------------------------
This list is sponsored by: Cenzic

Need to secure your web apps NOW?
Cenzic finds more, "real" vulnerabilities fast.
Click to try it, buy it or download a solution FREE today!

http://www.cenzic.com/downloads
------------------------------------------------------------------------

____________________________________________________

This message has been checked for Viruses and has been found to be
clean.

Marston's PLC Group Services IT Department
____________________________________________________

************************************************************************
**********
                      Visit our Web site at www.marstons.co.uk !!

This email is confidential and may be legally privileged as are any
files transmitted with it. It is intended solely for the use by the
person to whom it is addressed. If you are not the intended recipient,
be advised that you have received this e-mail in error and that any
disclosure, copying, distribution or any action taken or omitted to be
taken in reliance on it is strictly prohibited and may be unlawful.

Any views or opinions presented are solely those of the author and do
not necessarily represent those of Marston's PLC.

If you have received this e-mail in error please notify The Marston's IT
Service Desk on 01902 329500.

"Marston's PLC is a public limited company registered in England and
Wales. Registered number: 31461 Registered office: Marston's House,
Wolverhampton, WV1 4JT."
************************************************************************
**********

------------------------------------------------------------------------
This list is sponsored by: Cenzic

Need to secure your web apps NOW?
Cenzic finds more, "real" vulnerabilities fast.
Click to try it, buy it or download a solution FREE today!

http://www.cenzic.com/downloads
------------------------------------------------------------------------

------------------------------------------------------------------------
This list is sponsored by: Cenzic

Need to secure your web apps NOW?
Cenzic finds more, "real" vulnerabilities fast.
Click to try it, buy it or download a solution FREE today!

http://www.cenzic.com/downloads
------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:58:06 EDT