[55827] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Locating rogue APs

daemon@ATHENA.MIT.EDU (Martin Hannigan)
Tue Feb 11 17:51:51 2003

Date: Tue, 11 Feb 2003 17:45:08 -0500
From: Martin Hannigan <hannigan@fugawi.net>
To: Tony Rall <trall@almaden.ibm.com>
Cc: nanog@merit.edu
In-Reply-To: <OFB9114580.B7B03131-ON88256CCA.006D1044-88256CCA.006E19C9@us.ibm.com>
Errors-To: owner-nanog-outgoing@merit.edu


On Tue, Feb 11, 2003 at 01:02:34PM -0700, Tony Rall wrote:
> 
> On Tuesday, 2003-02-11 at 13:42 CST, "Matthew S. Hallacy" 
> <poptix@techmonkeys.org> wrote:
> > On Tue, Feb 11, 2003 at 11:27:28AM -0600, John Kristoff wrote:
> > > In general, MAC OUI designations may indicate a particular AP.  IP
> > > multicast group participation may also be used by some APs. Some
> > > APs have a few unique ports open.  Lastly, APs may be found with
> > > a radio on a particular default channel.  All of these potentially
> > > identifying characteristics may be used to help audit the network
> > > for rogue IPs.
> > 
> > Why are you posting this here? The information is somewhat 
> incomplete/incorrect
> > as well. Persons interested in finding rogue AP's would be much better
> > off with a tool such as kismet that already identifies model/make of
> > access points based on various datapoints (including the types you 
> posted),
> > as well as the ability to determine in where the AP is (pysically) with
> > the use of a GPS unit.
> 
> It appears that kismet requires either someone to walk around the facility 
> while running the program or that you have you have it installed on 
> machines all over your site.  Neither of those options interest me as a 
> long term solution to rogue AP monitoring.

Most solutions are going to require some walking around. How else
would you find them?

[ snip ]

You could setup a laptop, a GPS with a data cable, NetStumbler[free],
and a 8dbi 2.5ghz <802.11b> antenna and pickup everything clearly 
for a half a mile without walking around. I've just acquired this
setup myself. Google on "war driving +F150" and you'll see a setup
to help for < $55

A network IDS will most definately detect odd MAC addrs or manufacturer
octets, but you'll have to maintain the signatures. It's much easier
using the 'war driving' setup.



home help back first fref pref prev next nref lref last post