Re: HW/SW Rogue AP Wireless Detection

From: David T Hollis (dhollis@davehollis.com)
Date: Thu Mar 13 2003 - 18:14:34 EST


Gary Nugent wrote:

>Hello, there, I am looking for anyone who has had experience with a combined (pref. PDA) device for signal detection/analysis. I am familiar with the Fluke Ipaq-based product (http://www.flukenetworks.com/us/LAN/Handheld+Testers/WaveRunner/Overview.htm), but it is quite expensive (app. $2500 US or more). The rogue AP detection is a crucial part of this. Any thoughts?
>
>Regards,
>
>Gary Nugent
>E gary.nugent@acrodex.com
>
>
>--------------------------------------------------------------------
> This message originated from a mobile.rogers.com webmail account.
> Ce message provient d'un compte de courriel web mobile.rogers.com.
>--------------------------------------------------------------------
>
>----------------------------------------------------------------------------
>
>Are your vulnerability scans producing just another report?
>Manage the entire remediation process with StillSecure VAM's
>Vulnerability Repair Workflow.
>Download a free 15-day trial:
>http://www2.stillsecure.com/download/sf_vuln_list.html
>
>
Kismet (http://www.kismetwireless.net/) is some pretty scary stuff. Can
be made to run on an iPaq as well (though I think only under Linux, not
WinCE).

----------------------------------------------------------------------------
Did you know that you have VNC running on your network?
Your hacker does. Plug your security holes now!
Download a free 15-day trial of VAM:
http://www2.stillsecure.com/download/sf_vuln_list.html



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:53:30 EDT