Re: HW/SW Rogue AP Wireless Detection

From: David T Hollis (dhollisat_private)
Date: Thu Mar 13 2003 - 15:14:34 PST

  • Next message: aheckerat_private: "Aggregating vulnerability report data?"

    Gary Nugent wrote:
    
    >Hello, there, I am looking for anyone who has had experience with a combined (pref. PDA) device for signal detection/analysis.  I am familiar with the Fluke Ipaq-based product (http://www.flukenetworks.com/us/LAN/Handheld+Testers/WaveRunner/Overview.htm), but it is quite expensive (app. $2500 US or more).  The rogue AP detection is a crucial part of this.  Any thoughts? 
    >
    >Regards, 
    >
    >Gary Nugent 
    >E gary.nugentat_private
    >
    >
    >--------------------------------------------------------------------
    > This message originated from a mobile.rogers.com webmail account.
    > Ce message provient d'un compte de courriel web mobile.rogers.com.
    >--------------------------------------------------------------------
    >
    >----------------------------------------------------------------------------
    >
    >Are your vulnerability scans producing just another report?
    >Manage the entire remediation process with StillSecure VAM's
    >Vulnerability Repair Workflow.
    >Download a free 15-day trial:
    >http://www2.stillsecure.com/download/sf_vuln_list.html
    >  
    >
    Kismet (http://www.kismetwireless.net/) is some pretty scary stuff.  Can 
    be made to run on an iPaq as well (though I think only under Linux, not 
    WinCE).
    
    
    ----------------------------------------------------------------------------
    Did you know that you have VNC running on your network? 
    Your hacker does. Plug your security holes now! 
    Download a free 15-day trial of VAM:
    http://www2.stillsecure.com/download/sf_vuln_list.html
    



    This archive was generated by hypermail 2b30 : Fri Mar 14 2003 - 08:24:09 PST