RE: Wireless Scanning

From: Jaeson Schultz (jaeson@jaeson.net)
Date: Fri Sep 24 2004 - 15:46:02 EDT


Hi Chuck,

For finding bugs and spycams, a frequency counter and a spectrum analyzer
would be able to give you a good idea about which frequencies are in use.
You could then capture bits of each signal you find, and do some signal
processing to determine what the signal actually is. Using a directive
antenna you could determine which direction the signal is coming from and
hopefully trace it back to it's source. Some of these tools (especially the
spectrum analyzer) could be cost-prohibitive. Also, spread-spectrum signals
would be more difficult to detect, capture and analyze due to the changing
frequencies and the reduced power transmitted on any one of the frequencies
being used. The ARRL has lots of useful information which will be able to
help you out in this regard.

For finding the wireless networks, there are many tools available that use
your wireless NIC, etc. to find open access points, crack wep keys, etc.
Airsnort and Blusniff are two such tools availble at shmoo.com. There are
lots more tools out there.

All of these tools require some practice before you get good at using them.

Sincerely,
Jaeson Schultz
KG6TEC

-----Original Message-----
From: Chuck Fullerton [mailto:chuckf69@ceinetworks.com]
Sent: Friday, September 24, 2004 1:59 AM
To: RoF@yahoo; Pen-Test
Subject: Wireless Scanning

Everyone,

I'm currently looking for a tool (or compliment of tools) to perform
Wireless Scanning during a Pen test. My plan is to Scan first for the
presence of 802.11(whatever), bluetooth, spycams, bugs, etc. Once these are
detected, then each of the items found can have their security tested. My
goal of being able to do this is to Take a good security audit methodology
(such as the OSSTMM) and scale it down for small to medium business
effectively.

Can any one recommend tools that they have used to detect these items?

Chuck Fullerton
CEH,OPST,CISSP,CSS1,CCNP,CCDA,CNA,A+

----------------------------------------------------------------------------

--
Ethical Hacking at the InfoSec Institute. All of our class sizes are
guaranteed to be 12 students or less to facilitate one-on-one interaction
with one of our expert instructors. Check out our Advanced Hacking course,
learn to write exploits and attack security infrastructure. Attend a course
taught by an expert instructor with years of in-the-field pen testing
experience in our state of the art hacking lab. Master the skills of an
Ethical Hacker to better assess the security of your organization.
http://www.infosecinstitute.com/courses/ethical_hacking_training.html
----------------------------------------------------------------------------
---
------------------------------------------------------------------------------
Ethical Hacking at the InfoSec Institute. All of our class sizes are
guaranteed to be 12 students or less to facilitate one-on-one interaction
with one of our expert instructors. Check out our Advanced Hacking course,
learn to write exploits and attack security infrastructure. Attend a course
taught by an expert instructor with years of in-the-field pen testing
experience in our state of the art hacking lab. Master the skills of an
Ethical Hacker to better assess the security of your organization.
http://www.infosecinstitute.com/courses/ethical_hacking_training.html
-------------------------------------------------------------------------------


This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:54:06 EDT