There are places that actively monitor, watch, read, etc. every line of code that passes through the wired and wireless network. Regardless of whether it is personal or company computers.
The local university does that. And guess what... they can continue to monitor and trace that wifi communication as they walk the halls and locate the offenders wifi device.
We've even messed with them by hiding a wifi device in the walls and ceilings without telling anyone. And the IT department came running straight to it in less than 3 minutes. They are on it.
Some companies take this stuff seriously. Fortunately, in our case, while we were busted, they were impressed by what we had set up, and how well we had concealed its tracks, that they gave us a little bonus to encourage further development of our skills, as long as we promised to not do it on their network again.
And for the record, nobody at the school had any idea that we were even contemplating the little experiment. So IT was at their usual level of alert.
But, they do come running fast anytime any student attempts to violate any rule. And they will walk right up to you and identify you as the problem.
Every packet of data on the network is actively monitored. And every violation of the rules is immediately caught. You see them coming.
After observing this a few times, the instructor taught us to use the same tools. It's actually very simple. And it's interesting to play with.
We can actually sit in the classroom and monitor the data traffic in the building if we want to. And the portable tracer is very accurate. We've been experimenting with trying to trick it (under supervision). It's an interesting device.
The local university does that. And guess what... they can continue to monitor and trace that wifi communication as they walk the halls and locate the offenders wifi device.
We've even messed with them by hiding a wifi device in the walls and ceilings without telling anyone. And the IT department came running straight to it in less than 3 minutes. They are on it.
Some companies take this stuff seriously. Fortunately, in our case, while we were busted, they were impressed by what we had set up, and how well we had concealed its tracks, that they gave us a little bonus to encourage further development of our skills, as long as we promised to not do it on their network again.
And for the record, nobody at the school had any idea that we were even contemplating the little experiment. So IT was at their usual level of alert.
But, they do come running fast anytime any student attempts to violate any rule. And they will walk right up to you and identify you as the problem.
Every packet of data on the network is actively monitored. And every violation of the rules is immediately caught. You see them coming.
After observing this a few times, the instructor taught us to use the same tools. It's actually very simple. And it's interesting to play with.
We can actually sit in the classroom and monitor the data traffic in the building if we want to. And the portable tracer is very accurate. We've been experimenting with trying to trick it (under supervision). It's an interesting device.
Last edited: