Honeypots mailing list archives

airdefence's claims...


From: Dev <u02113 () cs unipune ernet in>
Date: 12 Dec 2003 10:24:51 -0000



hi ppl,

I get to the point first. Airdefence claims that it has got some "vendor-provided" signatures that it uses to identify 
mac spoofing - it can know that a certain card is spoofing the mac address of a different manufacturer's card. Is this 
possible?? How can they possibly fingerprint the card. Is it using some undisclosed non 802.11 frames or what??

I ask this becoz i m developing a wireless honeypot as part of my mtech project.


Current thread: