[55823] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Locating rogue APs

daemon@ATHENA.MIT.EDU (Matthew S. Hallacy)
Tue Feb 11 14:41:20 2003

Date: Tue, 11 Feb 2003 13:42:19 -0600
From: "Matthew S. Hallacy" <poptix@techmonkeys.org>
To: nanog@merit.edu
In-Reply-To: <20030211172728.GA32451@aharp.is-net.depaul.edu>
Errors-To: owner-nanog-outgoing@merit.edu


On Tue, Feb 11, 2003 at 11:27:28AM -0600, John Kristoff wrote:
> 
> Apologies if this ends up on the list multiple times.  I seem to
> have trouble getting this posted in a timely fashion.
> 
> In general, MAC OUI designations may indicate a particular AP.  IP
> multicast group participation may also be used by some APs. Some
> APs have a few unique ports open.  Lastly, APs may be found with
> a radio on a particular default channel.  All of these potentially
> identifying characteristics may be used to help audit the network
> for rogue IPs.  Below is information on locating particular APs:
> 

Why are you posting this here? The information is somewhat incomplete/incorrect
as well. Persons interested in finding rogue AP's would be much better
off with a tool such as kismet that already identifies model/make of
access points based on various datapoints (including the types you posted), 
as well as the ability to determine in where the AP is (pysically) with 
the use of a GPS unit.

As a side benefit, it can make pretty maps.

http://www.poptix.net/thehills.jpg

> John

-- 
Matthew S. Hallacy                            FUBAR, LART, BOFH Certified
http://www.poptix.net                           GPG public key 0x01938203

home help back first fref pref prev next nref lref last post