Re: HW/SW Rogue AP Wireless Detection

From: Bill Burge (bill@Burge.com)
Date: Thu May 08 2003 - 15:12:59 EDT


Sharp Zaurus,
Netgear CF wireless card,
Kismet

If I turn off the display backlight, I can get about an hour+ of promiscuous listening and logging

BBurge

*********** REPLY SEPARATOR ***********

On 5/7/2003 at 12:31 AM Daren Nowlan wrote:

>By taking an iPAQ & putting familiar linux
>(http://familiar.handhelds.org) on it and Opie as the GUI front end
>(http://opie.handhelds.org) as well as a few tools, you now have a
>powerful wifi/pen-testing tool and a handy little PDA as well.
>
>For WiFi detection Kismet has a port for the iPAQ running familiar.
>http://www.kismetwireless.net/
>
>I've also used Discoverer with some success but is limited.
>http://www.cs.swt.edu/~am60347/
>
>Wellenreiter is also working on a port over to the iPAQ running
>familiar.
>http://www.remote-exploit.org/
>
>Combine that with some other ported tools such as nmap, tcpdump, and
>netcat.... you have a powerfull little tools with many possiblities.
>
>For pen-testing, I've written simple scripts that allows me to push a
>shell on my iPAQ to my collegue. This allows me to then put the iPAQ
>back into my pocket while my partner scans the internal network.
>
>Of course we need to first get an IP and be able to route to the
>internet but I have done it and it works like a charm.
>
>If your creative, you can come up with a few good uses for it! :)
>
>Hope that helps.
>
>//Daren
>
>
>
>
>On Wed, 2003-03-12 at 13:27, Gary Nugent wrote:
>> Hello, there, I am looking for anyone who has had experience with a
>combined (pref. PDA) device for signal detection/analysis. I am familiar
>with the Fluke Ipaq-based product
>(http://www.flukenetworks.com/us/LAN/Handheld+Testers/WaveRunner/Overview.htm), but it is quite expensive (app. $2500 US or more). The rogue AP detection is a crucial part of this. Any thoughts?
>>
>> Regards,
>>
>> Gary Nugent
>> E gary.nugent@acrodex.com
>>
>>
>> --------------------------------------------------------------------
>> This message originated from a mobile.rogers.com webmail account.
>> Ce message provient d'un compte de courriel web mobile.rogers.com.
>> --------------------------------------------------------------------
>>
>>
>----------------------------------------------------------------------------
>>
>> Are your vulnerability scans producing just another report?
>> Manage the entire remediation process with StillSecure VAM's
>> Vulnerability Repair Workflow.
>> Download a free 15-day trial:
>> http://www2.stillsecure.com/download/sf_vuln_list.html
>
>---------------------------------------------------------------------------
>Did you know that you have VNC running on your network?
>Your hacker does.
>Plug your security holes.
>Download a free 15-day trial of VAM:
>http://www.securityfocus.com/StillSecure-pen-test
>----------------------------------------------------------------------------

---------------------------------------------------------------------------
Did you know that you have VNC running on your network?
Your hacker does.
Plug your security holes.
Download a free 15-day trial of VAM:
http://www.securityfocus.com/StillSecure-pen-test
----------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:53:32 EDT