lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <e4ce4c440507110259c8df9e4@mail.gmail.com>
Date: Mon Jul 11 10:59:28 2005
From: gkverma at gmail.com (Gaurav Kumar)
Subject: how to bypass rouge machine detection techniques

Friends,

There are several techniques available for detecting rouge (not being
a member of trusted domain) machines, such as active scanning, active
directory querying etc, but I guess most powerful being the one used
by epolicy orchestrator. Its agents (deployed on each subnet) checks
for L2 broadcasts like Arp broadcast etc. After detecting a broadcast,
it used the mac address and ip address to proceed further to detect
whether the machine is rouge or not.

http://www.networkassociates.com/us/local_content/white_papers/wp_epo3_5_rsdwhitepaper_july2004.pdf

I was wondering if this approach is foolproof and can be safely
deployed or if there is a way to bypass it?

Regards,
Gaurav

Powered by blists - more mailing lists