Information not being encrypted is the key knowledge here, and this is true even with WEP and WPA encryption standards.
On both pages referenced above, the Wireless security: MAC addressing and How to break MAC filtering, we claimed that information about MAC addresses and IP addresses is not encrypted when the wireless access point sends data to connected devices and receives it back.
' How can I get a MAC address or an IP address from simple listening to network traffic?' ' H ow do those utilities get the MAC address?' or someone that is already using the wireless network that we are trying to break into). On this page, we used some utilities that provided us with the MAC address of an already authenticated client (i.e. We write about this on the How to break MAC filtering (wifi security) page. We took our explanation to the next level by providing also one other analysis in which we attempted to break MAC filtering. The Wireless security: MAC addressing article describes what MAC addressing is and how it works. This page relates to the security concept called MAC addressing or MAC filtering which we described in more details on the following page: Wireless security: MAC addressing.