Security Basics mailing list archives
Re: Wireless blocking
From: <Steve.Cummings () barclayscapital com>
Date: Wed, 5 Oct 2005 17:51:29 +0100
Air defense maybe able to help you -----Original Message----- From: David Gillett <gillettdavid () fhda edu> To: 'Daryl Davis' <daryl () ultbingo com>; security-basics () securityfocus com <security-basics () securityfocus com> Sent: Wed Oct 05 16:45:36 2005 Subject: RE: Wireless blocking It's certainly easier to find if it will broadcast the SSID. But even if it doesn't, the SSID will be present in traffic when it is actually in use. One of the tools I carry is a directional "hotspot finder". Having a report in hand of unauthorised wireless in a particular area, it has been able to quickly lead me to the violator's office. This will become less useful as our legitimate wireless coverage is enhanced -- but with that will come the capability to detect and jam rogue points.... Actually, the first rogue wireless router I found showed up a bit differently. A wireless client tried to hack one of our systems. (We didn't know it was wireless at the time.) When I did a traceroute to the attacker, I got a response from another device on the same address block first, and THAT turned out to be due to proxy ARP response from the rogue router. But (a) that's an artefact of how that particular router was configured, and (b) it's not something you can probably easily scan your network for. David Gillett
-----Original Message----- From: Daryl Davis [mailto:daryl () ultbingo com] Sent: Tuesday, October 04, 2005 9:56 AM To: security-basics () securityfocus com Subject: Wireless blocking I believe I have an unauthorized wireless router on my network. I have been unable to physically find it as of yet. Does anyone know how to find the hidden SSID and then Jam it? Thank you. Daryl R Davis Digital Game Media, Inc.
------------------------------------------------------------------------ For more information about Barclays Capital, please visit our web site at http://www.barcap.com. Internet communications are not secure and therefore the Barclays Group does not accept legal responsibility for the contents of this message. Although the Barclays Group operates anti-virus programmes, it does not accept responsibility for any damage whatsoever that is caused by viruses being passed. Any views or opinions presented are solely those of the author and do not necessarily represent those of the Barclays Group. Replies to this email may be monitored by the Barclays Group for operational or business reasons. ------------------------------------------------------------------------
Current thread:
- Re: Wireless blocking, (continued)
- Re: Wireless blocking Tom Van de Wiele (Oct 05)
- Re: Wireless blocking xyberpix (Oct 06)
- Re: Wireless blocking Kevin white (Oct 06)
- RE: Wireless blocking Patton Roub (Oct 05)
- RE: Wireless blocking Charles Hammett (Oct 05)
- RE: Wireless blocking Bryan McAninch (Oct 05)
- Re: Wireless blocking lists (Oct 05)
- RE: Wireless blocking Joshua Berry (Oct 06)
- FW: Wireless blocking Charles Hammett (Oct 06)
- RE: Wireless blocking Beauford, Jason (Oct 06)
- Re: Wireless blocking Steve.Cummings (Oct 06)
- RE: Wireless blocking Steve McLaughlin (Oct 11)
- RE: Wireless blocking Dean De Beer (Oct 11)
- RE: Wireless blocking Gross Barry D. (Oct 11)
- Re: Wireless blocking Alex S. Harasic (Oct 11)
- Re: Wireless blocking Dragos Ruiu (Oct 12)
- Wireless Blocking Daryl Davis (Oct 14)
- RE: Wireless Blocking Alex S. Harasic (Oct 17)
- Wireless blocking Daryl Davis (Oct 24)