Re: How to track down a wireless hacker

From: Nicholas Chapel (nicholas.chapel@gmail.com)
Date: Wed Nov 07 2007 - 17:41:49 EST


On 11/7/07, ep <captgoodnight@hotmail.com> wrote:
> So setup a duplicate of the previously vulnerable wireless configuration and
> from a secure linux laptop (only thing on the segment) simply every 15
> minutes pass some unique clear text working credentials to a internet facing
> service you can monitor, like a ftp server or pop3 account. Wait for the
> connection/authentication and log the ip, then get law enforcement and the
> what I think will be a local ISP involved.

We are talking about wireless, right? Because in such a scenario,
logging the IP address won't make much of a difference since any IP
that the intruder has would be *one that your DHCP server leased to
him*. There is no ISP to involve here. Unless of course the intruder
accesses the FTP/POP3/whatever server from a different connection, in
which case he may very well be on someone *else's* WLAN and you'll end
up expending a great deal of effort and time (both yours and others')
and be no closer to knowing the identity of your malefactor than you
were before.

Yeah, I think hoping that the intruder would be daft enough to access
his Hotmail account is about the best you can hope for here.

--Nick

------------------------------------------------------------------------
This list is sponsored by: Cenzic

Need to secure your web apps NOW?
Cenzic finds more, "real" vulnerabilities fast.
Click to try it, buy it or download a solution FREE today!

http://www.cenzic.com/downloads
------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:58:12 EDT