[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20050826233748.GB12571@DRD1812.cccp>
Date: Fri, 26 Aug 2005 19:37:48 -0400
From: Mike Kershaw <dragorn@...metwireless.net>
To: bugtraq@...urityfocus.com
Subject: Re: Tool for Identifying Rogue Linksys Routers
> > Is there a scanning tool out there that can determine if there are
> > unauthorized Linksys (type) routers in a specific VLAN?
>
> Try pinging all hosts using nmap:
>
> Then find MAC addresses that are from Linksys's space. I know macchanger
> [1] has a list of what addresses belong to which vendors.
Except, of course, that most Linksys units allow mac cloning through the
web interface.
This won't find anyone who is deliberately avoiding the scan, nor anyone
who messed with the config out of boredom.
-m
--
Mike Kershaw/Dragorn <dragorn@...metwireless.net>
GPG Fingerprint: 3546 89DF 3C9D ED80 3381 A661 D7B2 8822 738B BDB1
Bus Error at 008BE426 while reading byte from DEADBEEF in User data space
Content of type "application/pgp-signature" skipped
Powered by blists - more mailing lists