[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <151e385b05082612292757859c@mail.gmail.com>
Date: Fri, 26 Aug 2005 14:29:11 -0500
From: Dave Hull <ireadit@...il.com>
To: Martin Mkrtchian <dotsecure@...il.com>
Cc: Bugtraq <bugtraq@...urityfocus.com>,
"Full-Disclosure (E-mail)" <full-disclosure@...ts.netsys.com>
Subject: Re: Tool for Identifying Rogue Linksys Routers
If the Linksys devices are DHCP clients themselves, you might be able
to use DHCPFingerprint to locate them when they renew their leases.
You may want to contact the folks at http://www.packetfence.org. They
may have a more comprehensive list of signatures.
Also, nmap may work, see
http://seclists.org/lists/nmap-dev/2003/Apr-Jun/0010.html for more
details.
Examining TTLs of packets coming from edge devices may also give you
some indication of who's sitting behind an extra hop, though some
folks may be savvy enough to tweak this on their workstations to avoid
detection.
Good luck.
On 8/25/05, Martin Mkrtchian <dotsecure@...il.com> wrote:
> Dear Group Members
>
> We are migrating from Lucent QIP to MetaIP for DHCP services and so
> far we have had two issues when MetaIP has been implemented for VLAN
> that has an unauthorized Linksys router giving out IP addresses.
>
> Is there a scanning tool out there that can determine if there are
> unauthorized Linksys (type) routers in a specific VLAN?
>
> Your input is appreciated
>
> Thank You
>
> Martin M
> http://dotsecure.blogspot.com
>
--
Dave Hull
ireadit@...il.com
Powered by blists - more mailing lists