Not at all - if you use the LAN based component of the Airtight unit to send
packets to all the MAC addresses visible on that wired network, then any
bridging devices (eg Wireless APs) should transmit these packets into the
air, and the wireless component of Airtight would pick these up and identify
the presence of a wireless device connected to your LAN. You're right in
that you couldn't work the other way round - sorry for not being clearer!
Rgds,
Tim
----- Original Message -----
From: "Hari Sekhon" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Cc: <[email protected]>
Sent: Wednesday, March 21, 2007 12:36 PM
Subject: Re: Wired detection of rogue access points
that can't be very effective, if I attached a rogue access point, the
first thing I would do is to wpa protect it so nobody else can use it and
arouse suspicions...
it would also block this test.
Hari Sekhon
[EMAIL PROTECTED] wrote:
www.Airtightnetworks.net offer commercial products that can do what you
need.
It sits on your network and works by sending small packets back to itself
through any air based devices it can pick up (if these are connected to
your network then the packets will loop back), thus both valid and
invalid access points can be identified.
Rgds
Tim
Sent from my BlackBerry® wireless device
-----Original Message-----
From: [EMAIL PROTECTED]
Date: 19 Mar 2007 10:20:43 To:[email protected]
Subject: Wired detection of rogue access points
Hello there,
Can anyone point me to a wired LAN scanner/sniffer that detects wireless
access points connected to the LAN?
Thanks,
JW
------------------------------------------------------------------------
Test Your IDS
Is your IDS deployed correctly?
Find out quickly and easily by testing it with real-world attacks from
CORE IMPACT.
Go to
http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw
to learn more.
------------------------------------------------------------------------
------------------------------------------------------------------------
Test Your IDS
Is your IDS deployed correctly?
Find out quickly and easily by testing it
with real-world attacks from CORE IMPACT.
Go to http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw
to learn more.
------------------------------------------------------------------------