Why not used a sniffer to at least identify the network the device is on?.
It sounds like your policy of "Do not plug it in unless we know what it is"
should have an inventory of approved devices.  Given this, it would be
fairly easy to locate your "perpetrator".

What about limiting dhcp scopes to only approved mac addrs?

Regards,

Craig

        -----Original Message-----
        From:   Burgess, Jeff [SMTP:[EMAIL PROTECTED]]
        Sent:   Thursday, April 22, 1999 12:21 PM
        To:     '[EMAIL PROTECTED]'
        Subject:        Looking for...


         I'm looking for a SYN attack type utility to use here at the bank.
We have
        a "Do not plug it in unless we know what it is" type policy here,
but we've
        been getting odd machines starting to show up in our DHCP scopes
here and
        there.

         What we would like to do is SYN attack these specific devices and
wait for
        the call saying this machine isn't working come and fix it.  We've
actually
        tried to flood some of these devices with pings, but we've actually
only
        ended up bringing down whole network segments and we don't want that
to
        happen.

         Can anyone point me in the general direction of even a simple SYN
attack
        app?

         Thanks.


        Jeffrey T Burgess
        Internet/Intranet Administrator
        Liberty Bank
        [EMAIL PROTECTED]
        P (860) 344-7300
        F (860) 704-2113

        ---
                |\      _,,,---,,_
         ZZZzz  /,`.-'`'    -.  ;-;;,_
               |,4-  ) )-,_. ,\ (  `'-' 
              '---''(_/--'  `-'\_)     

         <<Jeffrey T  Burgess.vcf>>  << File: Jeffrey T  Burgess.vcf >> 
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to