Re: HW/SW Rogue AP Wireless Detection

From: Bill Burge (billat_private)
Date: Thu May 08 2003 - 12:12:59 PDT

  • Next message: Dario Ciccarone: "RE: Loose source routing for remote host discovery"

    Sharp Zaurus, 
    Netgear CF wireless card, 
    Kismet
    
    If I turn off the display backlight, I can get about an hour+ of promiscuous listening and logging
    
    BBurge
    
    *********** REPLY SEPARATOR  ***********
    
    On 5/7/2003 at 12:31 AM Daren Nowlan wrote:
    
    >By taking an iPAQ & putting familiar linux
    >(http://familiar.handhelds.org) on it and Opie as the GUI front end
    >(http://opie.handhelds.org) as well as a few tools, you now have a
    >powerful wifi/pen-testing tool and a handy little PDA as well.
    >
    >For WiFi detection Kismet has a port for the iPAQ running familiar.
    >http://www.kismetwireless.net/
    >
    >I've also used Discoverer with some success but is limited.
    >http://www.cs.swt.edu/~am60347/
    >
    >Wellenreiter is also working on a port over to the iPAQ running
    >familiar.
    >http://www.remote-exploit.org/
    >
    >Combine that with some other ported tools such as nmap, tcpdump, and
    >netcat.... you have a powerfull little tools with many possiblities.
    >
    >For pen-testing, I've written simple scripts that allows me to push a
    >shell on my iPAQ to my collegue. This allows me to then put the iPAQ
    >back into my pocket while my partner scans the internal network. 
    >
    >Of course we need to first get an IP and be able to route to the
    >internet but I have done it and it works like a charm.
    >
    >If your creative, you can come up with a few good uses for it!  :)
    >
    >Hope that helps.
    >
    >//Daren
    >
    >
    >
    >
    >On Wed, 2003-03-12 at 13:27, Gary Nugent wrote:
    >> Hello, there, I am looking for anyone who has had experience with a
    >combined (pref. PDA) device for signal detection/analysis.  I am familiar
    >with the Fluke Ipaq-based product
    >(http://www.flukenetworks.com/us/LAN/Handheld+Testers/WaveRunner/Overview.htm), but it is quite expensive (app. $2500 US or more).  The rogue AP detection is a crucial part of this.  Any thoughts? 
    >> 
    >> Regards, 
    >> 
    >> Gary Nugent 
    >> E gary.nugentat_private
    >> 
    >> 
    >> --------------------------------------------------------------------
    >>  This message originated from a mobile.rogers.com webmail account.
    >>  Ce message provient d'un compte de courriel web mobile.rogers.com.
    >> --------------------------------------------------------------------
    >> 
    >>
    >----------------------------------------------------------------------------
    >> 
    >> Are your vulnerability scans producing just another report?
    >> Manage the entire remediation process with StillSecure VAM's
    >> Vulnerability Repair Workflow.
    >> Download a free 15-day trial:
    >> http://www2.stillsecure.com/download/sf_vuln_list.html
    >
    >---------------------------------------------------------------------------
    >Did you know that you have VNC running on your network?
    >Your hacker does.
    >Plug your security holes.
    >Download a free 15-day trial of VAM:
    >http://www.securityfocus.com/StillSecure-pen-test
    >----------------------------------------------------------------------------
    
    
    
    
    
    ---------------------------------------------------------------------------
    Did you know that you have VNC running on your network?
    Your hacker does.
    Plug your security holes.
    Download a free 15-day trial of VAM:
    http://www.securityfocus.com/StillSecure-pen-test
    ----------------------------------------------------------------------------
    



    This archive was generated by hypermail 2b30 : Thu May 08 2003 - 14:10:49 PDT