Full Disclosure mailing list archives
how to bypass rouge machine detection techniques
From: Gaurav Kumar <gkverma () gmail com>
Date: Mon, 11 Jul 2005 15:29:21 +0530
Friends, There are several techniques available for detecting rouge (not being a member of trusted domain) machines, such as active scanning, active directory querying etc, but I guess most powerful being the one used by epolicy orchestrator. Its agents (deployed on each subnet) checks for L2 broadcasts like Arp broadcast etc. After detecting a broadcast, it used the mac address and ip address to proceed further to detect whether the machine is rouge or not. http://www.networkassociates.com/us/local_content/white_papers/wp_epo3_5_rsdwhitepaper_july2004.pdf I was wondering if this approach is foolproof and can be safely deployed or if there is a way to bypass it? Regards, Gaurav _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- how to bypass rouge machine detection techniques Gaurav Kumar (Jul 11)
- RE: how to bypass rouge machine detection techniques Paul Melson (Jul 11)
- Re: how to bypass rouge machine detection techniques Gaurav Kumar (Jul 11)
- Re: how to bypass rouge machine detection techniques Michael Holstein (Jul 11)
- Re: how to bypass rogue machine detection techniques Devdas Bhagat (Jul 11)
- Re: how to bypass rouge machine detection techniques Gaurav Kumar (Jul 11)
- <Possible follow-ups>
- RE: how to bypass rouge machine detection techniques Cassidy Macfarlane (Jul 11)
- RE: how to bypass rouge machine detection techniques Lauro, John (Jul 11)
- RE: how to bypass rouge machine detection techniques Paul Melson (Jul 11)