RE: Where is the Wireless line?



Barry,

I am not a Lawyer or knowledgeable to the full extent of the law.

In the UK it is illegal to connect to an access point to do not have
permission to use. I suppose it depends where you are, though I would
not recommend taking the actions you specified.

A printer is a company resource just like files and data. (Think how
*nix represents hardware as a file)

Perhaps knock the door and outright tell an IT representative?

In my opinion, at the end of the day if you have no affiliation with the
company, it's not your problem and taking advantage of the current
situation could cause trouble for you even if you have good intentions.

Hope this helps and is accurate!

Other opinions please!

Regards,

Matt Steer


-----Original Message-----
From: listbounce@xxxxxxxxxxxxxxxxx [mailto:listbounce@xxxxxxxxxxxxxxxxx]
On Behalf Of Barry Fawthrop
Sent: 05 September 2007 02:57
To: pen-test@xxxxxxxxxxxxxxxxx
Subject: Where is the Wireless line?

Hi All

Where does the wireless line being and end with regards to "illegal
access"

Concept:

If company A has a wireless network (unprotected) No Encryption,
Broadcasting SSID, Default Acesss point user_name and password.

You know they need security. So is it wrong to
access the network and print to their printer a document
saying "You need security, I just accessed your network"

Or would one have to have permission first!.
I'm not talking about accessing data and files, but using the printer
and printing on their paper that they need help!!!.
And then going in and asking for a security contract having proved
beyond doubt that they need it.

Otherwise before hand it is just your word & experience against theirs
and obviously they are not going to admit they need help without being
shown?

Curious to hear your comments, or possible solutions to the same/similar
problems??

Thanks
Barry

------------------------------------------------------------------------
This list is sponsored by: Cenzic

Need to secure your web apps NOW?
Cenzic finds more, "real" vulnerabilities fast.
Click to try it, buy it or download a solution FREE today!

http://www.cenzic.com/downloads
------------------------------------------------------------------------



____________________________________________________

This message has been checked for Viruses and has been found
to be clean.

Marston's PLC Group Services IT Department
____________________________________________________



**********************************************************************************
Visit our Web site at www.marstons.co.uk !!

This email is confidential and may be legally privileged as are any files
transmitted with it. It is intended solely for the use by the person to
whom it is addressed. If you are not the intended recipient, be advised
that you have received this e-mail in error and that any disclosure,
copying, distribution or any action taken or omitted to be taken in
reliance on it is strictly prohibited and may be unlawful.

Any views or opinions presented are solely those of the author and do
not necessarily represent those of Marston's PLC.

If you have received this e-mail in error please notify
The Marston's IT Service Desk on 01902 329500.

"Marston's PLC is a public limited company registered in England and Wales. Registered number: 31461 Registered office: Marston's House, Wolverhampton, WV1 4JT."
**********************************************************************************


------------------------------------------------------------------------
This list is sponsored by: Cenzic

Need to secure your web apps NOW?
Cenzic finds more, "real" vulnerabilities fast.
Click to try it, buy it or download a solution FREE today!

http://www.cenzic.com/downloads
------------------------------------------------------------------------



Relevant Pages

  • repost from the blackhat convention about web parts/apps
    ... a South African security consultant. ... Chief of Staff," provides an overview showing what attacks have ... commonly trying to intrude upon your network ... Web apps can encapsulate complex business ...
    (microsoft.public.sharepoint.portalserver.development)
  • Re: Where is the Wireless line?
    ... Where does the wireless line being and end with regards to "illegal access" ... If company A has a wireless network No Encryption, ... You know they need security. ... buy it or download a solution FREE today! ...
    (Pen-Test)
  • RE: Skype use obligation - Security x Productivity
    ... Skype use obligation - Security x Productivity ... one of our customers has its network pretty restricted, ... solution FREE - limited Time Offer ...
    (Pen-Test)
  • Re: SQL Injection- Bypassing magic_quotes
    ... is there a way to bypass PHP magic_quotes in order to run MSSQL SQL ... Chief Information Security Officer ... Need to secure your web apps NOW? ... buy it or download a solution FREE today! ...
    (Pen-Test)
  • Re: Where is the Wireless line?
    ... Where does the wireless line being and end with regards to "illegal access" ... If company A has a wireless network No Encryption, ... You know they need security. ... buy it or download a solution FREE today! ...
    (Pen-Test)