Yup however we have Cisco coming in next week and gonna show us a way to spoof connections......so the applet thing is removed and once the session starts it can support encryption connections for keywords. E.G. If someone is reading emails over a personal device via SSL and it has a keyword we dont like it will flag. Apparently it been possible for years god knows...
yea that old. I know companies been doing that for over a decade know
Apparently a supervisor liked a girl I was dating. She sent me a email which had keyword "kiss" at work, IT alerted his buddy supervisor and I think you know the rest lol
But I seriously doubt you guys can read ssl https paswords just based off a person joining the wifi and if so that can be deviated by using autofill password managers
[doublepost=1490228605][/doublepost]
There are places that actively monitor, watch, read, etc. every line of code that passes through the wired and wireless network. Regardless of whether it is personal or company computers.
The local university does that. And guess what... they can continue to monitor and trace that wifi communication as they walk the halls and locate the offenders wifi device.
We've even messed with them by hiding a wifi device in the walls and ceilings without telling anyone. And the IT department came running straight to it in less than 3 minutes. They are on it.
Some companies take this stuff seriously. Fortunately, in our case, while we were busted, they were impressed by what we had set up, and how well we had concealed its tracks, that they gave us a little bonus to encourage further development of our skills, as long as we promised to not do it on their network again.
And for the record, nobody at the school had any idea that we were even contemplating the little experiment. So IT was at their usual level of alert.
But, they do come running fast anytime any student attempts to violate any rule. And they will walk right up to you and identify you as the problem.
Every packet of data on the network is actively monitored. And every violation of the rules is immediately caught. You see them coming.
After observing this a few times, the instructor taught us to use the same tools. It's actually very simple. And it's interesting to play with.
We can actually sit in the classroom and monitor the data traffic in the building if we want to. And the portable tracer is very accurate. We've been experimenting with trying to trick it (under supervision). It's an interesting device.
LOL there is no portable tracer device that will find a person device that is using the wifi.
what IT knows is the general area of the offender and they know what kid of device it is and location so they go looking for the most suspect looking person that is using the device and spy on you screen then they say something
No device can directly trace somebody device that is on the wifi network
[doublepost=1490229046][/doublepost]
[attempted-sarcasm]actually typed it, but[/attempted-sarcasm] yes.
That is a dang lie. HAHAHA
[doublepost=1490229237][/doublepost]
The typing part was the sarcasm... sorry I should have just said yes.
The answer is yes, I can look at ssl traffic on my network very easily.
you can look at all day all the numbers and symbols and odd language but you cannot read the "actually" encrypted data