Re: HW/SW Rogue AP Wireless Detection

From: Daren Nowlan (daren@securitynerds.org)
Date: Wed May 07 2003 - 00:31:13 EDT


By taking an iPAQ & putting familiar linux
(http://familiar.handhelds.org) on it and Opie as the GUI front end
(http://opie.handhelds.org) as well as a few tools, you now have a
powerful wifi/pen-testing tool and a handy little PDA as well.

For WiFi detection Kismet has a port for the iPAQ running familiar.
http://www.kismetwireless.net/

I've also used Discoverer with some success but is limited.
http://www.cs.swt.edu/~am60347/

Wellenreiter is also working on a port over to the iPAQ running
familiar.
http://www.remote-exploit.org/

Combine that with some other ported tools such as nmap, tcpdump, and
netcat.... you have a powerfull little tools with many possiblities.

For pen-testing, I've written simple scripts that allows me to push a
shell on my iPAQ to my collegue. This allows me to then put the iPAQ
back into my pocket while my partner scans the internal network.

Of course we need to first get an IP and be able to route to the
internet but I have done it and it works like a charm.

If your creative, you can come up with a few good uses for it! :)

Hope that helps.

//Daren

On Wed, 2003-03-12 at 13:27, Gary Nugent wrote:
> Hello, there, I am looking for anyone who has had experience with a combined (pref. PDA) device for signal detection/analysis. I am familiar with the Fluke Ipaq-based product (http://www.flukenetworks.com/us/LAN/Handheld+Testers/WaveRunner/Overview.htm), but it is quite expensive (app. $2500 US or more). The rogue AP detection is a crucial part of this. Any thoughts?
>
> Regards,
>
> Gary Nugent
> E gary.nugent@acrodex.com
>
>
> --------------------------------------------------------------------
> This message originated from a mobile.rogers.com webmail account.
> Ce message provient d'un compte de courriel web mobile.rogers.com.
> --------------------------------------------------------------------
>
> ----------------------------------------------------------------------------
>
> Are your vulnerability scans producing just another report?
> Manage the entire remediation process with StillSecure VAM's
> Vulnerability Repair Workflow.
> Download a free 15-day trial:
> http://www2.stillsecure.com/download/sf_vuln_list.html

---------------------------------------------------------------------------
Did you know that you have VNC running on your network?
Your hacker does.
Plug your security holes.
Download a free 15-day trial of VAM:
http://www.securityfocus.com/StillSecure-pen-test
----------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:53:32 EDT