Penetration Testing mailing list archives

Re: HW/SW Rogue AP Wireless Detection


From: Daren Nowlan <daren () securitynerds org>
Date: 07 May 2003 00:31:13 -0400

By taking an iPAQ & putting familiar linux
(http://familiar.handhelds.org) on it and Opie as the GUI front end
(http://opie.handhelds.org) as well as a few tools, you now have a
powerful wifi/pen-testing tool and a handy little PDA as well.

For WiFi detection Kismet has a port for the iPAQ running familiar.
http://www.kismetwireless.net/

I've also used Discoverer with some success but is limited.
http://www.cs.swt.edu/~am60347/

Wellenreiter is also working on a port over to the iPAQ running
familiar.
http://www.remote-exploit.org/

Combine that with some other ported tools such as nmap, tcpdump, and
netcat.... you have a powerfull little tools with many possiblities.

For pen-testing, I've written simple scripts that allows me to push a
shell on my iPAQ to my collegue. This allows me to then put the iPAQ
back into my pocket while my partner scans the internal network. 

Of course we need to first get an IP and be able to route to the
internet but I have done it and it works like a charm.

If your creative, you can come up with a few good uses for it!  :)

Hope that helps.

//Daren




On Wed, 2003-03-12 at 13:27, Gary Nugent wrote:
Hello, there, I am looking for anyone who has had experience with a combined (pref. PDA) device for signal 
detection/analysis.  I am familiar with the Fluke Ipaq-based product 
(http://www.flukenetworks.com/us/LAN/Handheld+Testers/WaveRunner/Overview.htm), but it is quite expensive (app. $2500 
US or more).  The rogue AP detection is a crucial part of this.  Any thoughts? 

Regards, 

Gary Nugent 
E gary.nugent () acrodex com


--------------------------------------------------------------------
 This message originated from a mobile.rogers.com webmail account.
 Ce message provient d'un compte de courriel web mobile.rogers.com.
--------------------------------------------------------------------

----------------------------------------------------------------------------

Are your vulnerability scans producing just another report?
Manage the entire remediation process with StillSecure VAM's
Vulnerability Repair Workflow.
Download a free 15-day trial:
http://www2.stillsecure.com/download/sf_vuln_list.html

---------------------------------------------------------------------------
Did you know that you have VNC running on your network?
Your hacker does.
Plug your security holes.
Download a free 15-day trial of VAM:
http://www.securityfocus.com/StillSecure-pen-test
----------------------------------------------------------------------------


Current thread: