Security Basics mailing list archives
RE: Wireless Security (Part 2)
From: "Ebeling, Jr., Herman Frederick" <hfebelingjr () lycos com>
Date: Wed, 17 May 2006 16:33:56 -0400
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ----Original Message---- From: Murad Talukdar [mailto:talukdar_m () subway com] Sent: Tuesday, 16 May, 2006 21:16 To: Murad Talukdar; security-basics () securityfocus com; hfebelingjr () lycos com Subject: RE: Wireless Security (Part 2) : Hi Herman, : I don't think you'd get what you wanted from ipconfig /all-it would : show you gateways/dns etc but not other machines that are connected : to yours. Netstat could do that. Your router may have some ability : to show connections in a gui or even in the logs. : You could possibly use arp to work out MAC addresses too. Working : out IP's on a wireless network is only part of the solution : though--where are they physically? You'd need some kind of tool to : narrow that down. I know Netstumbler is good for checking AP's but : don't know if it can be used to find wireless NIC's that are : connected. Might be worth investigating--someone else on the list : may be better at telling you that. As ever, change the keys for the : SSID often if it is using WEP or go to WPA if the router has the : capability. Good luck. : : : Murad, I through ipconfig/all out there for discussion. I figured that there had to be tools out there that could gleam information on an attacking computer without actually going into said attacker's computer. And as you've said one needs to change certain parameter's on a regular basis, to keep those who would try to illegally access one's network OUT of it. As all the evidence gathering ISN'T going to do one any good if the criminals have already done their damage. :-( - ----- Herman Live Long and Prosper ___________________ _-_ \==============_=_/ ____.---'---`---.____ \_ \ \----._________.----/ \ \ / / `-_-' __,--`.`-'..'-_ /____ ||- `--.____,-' -----BEGIN PGP SIGNATURE----- Version: PGP 8.0.3 Comment: Space the Final Frontier iQA/AwUBRGuIsB/i52nbE9vTEQIargCeJ7SDt9t49cNqf0jYmzpatPSb5mMAnRBi StHRr9/UAouavrhA1XgNg0Qr =HKCx -----END PGP SIGNATURE-----
Current thread:
- RE: Wireless Security (Part 2), (continued)
- RE: Wireless Security (Part 2) Craig Wright (May 16)
- RE: Wireless Security (Part 2) Steve Armstrong (May 16)
- RE: Wireless Security (Part 2) Ebeling, Jr., Herman Frederick (May 17)
- RE: Wireless Security (Part 2) Ramsdell, Scott (May 16)
- RE: Wireless Security (Part 2) Bob Radvanovsky (May 16)
- Re: Wireless Security (Part 2) Robb Wait (May 20)
- RE: Wireless Security (Part 2) Bob Radvanovsky (May 16)
- RE: Wireless Security (Part 2) Craig Wright (May 17)
- RE: Wireless Security (Part 2) Craig Wright (May 17)
- RE: Wireless Security (Part 2) Murad Talukdar (May 17)
- RE: Wireless Security (Part 2) Ebeling, Jr., Herman Frederick (May 20)
- RE: Wireless Security (Part 2) Craig Wright (May 20)
- Re: Wireless Security (Part 2) Ian Scott (May 23)
- RE: Wireless Security (Part 2) Ebeling, Jr., Herman Frederick (May 23)
- Re: Wireless Security (Part 2) Ian Scott (May 23)
- Re: RE: Wireless Security (Part 2) mikem (May 20)
- RE: RE: Wireless Security (Part 2) Ebeling, Jr., Herman Frederick (May 23)
- RE: RE: Wireless Security (Part 2) Lloydm (May 23)
- Re: RE: Wireless Security (Part 2) Ansgar -59cobalt- Wiechers (May 24)
- RE: RE: Wireless Security (Part 2) Ebeling, Jr., Herman Frederick (May 23)
- RE: RE: Wireless Security (Part 2) Murad Talukdar (May 23)
- RE: Wireless Security (Part 2) Craig Wright (May 23)
- Re: Wireless Security (Part 2) Ian Scott (May 24)