You forgot *BSD (OpenBSD/FreeBSD/NetBSD): - dstumbler: http://www.dachb0den.com/projects/bsd-airtools.html prism2/Lucent
-Ron On Sunday, June 9, 2002 at 19:28:14, Kroma Pierre wrote: > perhaps you can try the following tools: > > win: > - netstumbler: www.netstumbler.com (Orinoco - chipset) > - apsniff: http://www.bretmounet.com/ApSniff/ (prism2) > > linux: > - kismet: http://www.kismetwireless.net/ (prism2, cisco) > - wellenreiter: http://www.remote-exploit.org/ (prism2, cisco) > > Best regards, > > Pierre > > > On Fri, 7 Jun 2002 18:22:13 -0000 > Isherwood Jeff C Contr AFRL/IFOSS <[EMAIL PROTECTED]> wrote: > > > I'm doing some research for a paper on wireless security, and I've been > > trying to find a decent way for an administrator to probe his network for > > APs that might be attached. > > > > There seems to be very little out there for this sort of thing. > > > > NMAP can recognize a fingerprint of some APs, but not all... > > > > ISS can sweep a wire, and report back on any that have SNMP enabled... > > > > APTOOLS claims to be capable, but isn't that easy to use or figure out (for > > me so far) > > > > > > Is there anything else out there? > > ---------------------------------------------------------------------------- This list is provided by the SecurityFocus Security Intelligence Alert (SIA) Service. For more information on SecurityFocus' SIA service which automatically alerts you to the latest security vulnerabilities please see: https://alerts.securityfocus.com/
