Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

If they use WPA/WPA2 the WiFi signal is encrypted so can't see anything without the key. You can make assumptions about the traffic volume and the involved machines but the data is insivisible.

If you are able to get the key or they use no encryption or WEP you can look at the packets and get metadata for SSL sessions and all unencrypted traffic.



agree and adding: i recently learned the Key is different to the password to associate, ie you must capture the session key exchange when each client device joins the network, it's not just enough to know the network's passphrase. If you know the passphrase and capture the key exchange, then you can decrypt traffic. My local coffee spot runs a public/guest WPA network, even though we all know the passphrase, even plain text traffic is moderately secure. I guess forcing a key-exchange is possible, but just sharing what i recently learned. I think it's called EAPOL. https://en.wikipedia.org/wiki/EAPOL


the data is insivisible

And that includes source/destination IP? Didn't know that..


Yes, sure. All they can see is the AP you're talking to; everything "above" is encrypted.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: