I have not yet seen a Bluetooth "scanner", either hardware or software. But, that doesn't mean it doesn't exist, though. However, I do occasionally carry a portable spectrum analyzer for watching WiFi frequency use at my facilities, and I often catch Bluetooth devices with it.
That said, has anybody seen either a hardware or software scanner for Bluetooth? The question it raises for me is, since I don't anticipate finding "rogue Bluetooth Access Points", what use would it be besides clandestine (or otherwise) data capture? David >>> [EMAIL PROTECTED] 03/18/03 05:55PM >>> Does it work for Bluetooth? Art -----Original Message----- From: Mike Outmesguine [mailto:[EMAIL PROTECTED] Sent: Tuesday, March 18, 2003 2:31 PM To: [EMAIL PROTECTED] Subject: [SOCALWUG] Network Magazine article on wireless LAN analyzers http://www.networkmagazine.com/article/NMG20030305S0001/1 Wireless LAN Analyzers: The Ultimate Hacking Tools? A Wi-Fi protocol analyzer can help you plan and secure your network even if you don't use Wi-Fi. Protocol analyzers are usually regarded as testing and planning tools: You don't plug one in unless you actually have a network, or at least some cable, and often not until something goes wrong. In a Wireless LAN (WLAN), things are different. Its physical medium is the electromagnetic spectrum, which exists everywhere and respects few boundaries. Wi-Fi is now available at two different frequencies-IEEE 802.11b at 2.4GHz and IEEE 802.11a at 5GHz-and both can suffer interference from neighboring networks and other sources. The only way to know for sure which will work best in a particular environment is to perform a comprehensive site survey before buying a single access point. Even if you have no intention of investing in Wi-Fi, knowing what's passing through your airwaves can still be useful. In addition to full-featured hardware and software analyzers, several vendors are pitching simpler, cheaper versions as security tools. These are designed to detect and track down rogue access points-WLAN base stations set up by employees without the IT department's knowledge. Almost all Wi-Fi hardware has its security features off by default, and the cheaper consumer-level models may not include any security at all, so these rogues can act as an open door into an otherwise well-protected network. [see the site for complete article including some informative tables with product details] http://www.networkmagazine.com/article/NMG20030305S0001/1
