chpalmer wrote:
Looks like a neat little device...
A practice by some is to visit an establishment with a laptop or other equipment and impersonate the establishments wifi. Its a type of "Man in the Middle" attack. This system acts as a proxy and passes all your information through to the establishment or other connection. The perp then harvests any user passwords and associated sites. Being that he is probably right out in the customer area near you your "product" may pick his signal first due to the stronger signal.
....
Jay- this is kinda the original reason for this post... So that someone going out of his area could easily find a hotspot if needed without having to look to hard. Im glad the security was brought up though. But if you need to get to Mapquest, hopefully this helps... :)
to keep back on topic there are hundreds of sites that googlemap locations or just print up this list
http://www.wififreespot.com/wa.htmlas for the the attack you purposed,
when the hacker comes in with a laptop faking a ESSID of tac0bell when the ESSID is actually tacobell (he replaced a zero for the 'oh') that would be a social engineering hack as he didnt do anything but trick people.
he then could proxy all traffic and collect information as a man in the middle.
the better way to do this man in the middle is just to ARP poison the ESSID tacobell so that people legitimately connect to the network and with out knowing it they pass all the traffic to me. want to do that? check out ettercap for starters but dont run it on anything but a test network you can nicely take down your corporate network it works that well, but your IT department wont enjoy a bunch of switches with messed up ARP tables.