Why not used a sniffer to at least identify the network the device is on?.
It sounds like your policy of "Do not plug it in unless we know what it is"
should have an inventory of approved devices. Given this, it would be
fairly easy to locate your "perpetrator".
What about limiting dhcp scopes to only approved mac addrs?
Regards,
Craig
-----Original Message-----
From: Burgess, Jeff [SMTP:[EMAIL PROTECTED]]
Sent: Thursday, April 22, 1999 12:21 PM
To: '[EMAIL PROTECTED]'
Subject: Looking for...
I'm looking for a SYN attack type utility to use here at the bank.
We have
a "Do not plug it in unless we know what it is" type policy here,
but we've
been getting odd machines starting to show up in our DHCP scopes
here and
there.
What we would like to do is SYN attack these specific devices and
wait for
the call saying this machine isn't working come and fix it. We've
actually
tried to flood some of these devices with pings, but we've actually
only
ended up bringing down whole network segments and we don't want that
to
happen.
Can anyone point me in the general direction of even a simple SYN
attack
app?
Thanks.
Jeffrey T Burgess
Internet/Intranet Administrator
Liberty Bank
[EMAIL PROTECTED]
P (860) 344-7300
F (860) 704-2113
---
|\ _,,,---,,_
ZZZzz /,`.-'`' -. ;-;;,_
|,4- ) )-,_. ,\ ( `'-'
'---''(_/--' `-'\_)
<<Jeffrey T Burgess.vcf>> << File: Jeffrey T Burgess.vcf >>
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]