BugTraq
Tool for Identifying Rogue Linksys Routers Aug 25 2005 06:48PM
Martin Mkrtchian (dotsecure gmail com) (5 replies)
Re: Tool for Identifying Rogue Linksys Routers Aug 27 2005 12:13AM
Tony Rall (trall almaden ibm com)
Re: Tool for Identifying Rogue Linksys Routers Aug 26 2005 07:29PM
Dave Hull (ireadit gmail com)
If the Linksys devices are DHCP clients themselves, you might be able
to use DHCPFingerprint to locate them when they renew their leases.

You may want to contact the folks at http://www.packetfence.org. They
may have a more comprehensive list of signatures.

Also, nmap may work, see
http://seclists.org/lists/nmap-dev/2003/Apr-Jun/0010.html for more
details.

Examining TTLs of packets coming from edge devices may also give you
some indication of who's sitting behind an extra hop, though some
folks may be savvy enough to tweak this on their workstations to avoid
detection.

Good luck.

On 8/25/05, Martin Mkrtchian <dotsecure (at) gmail (dot) com [email concealed]> wrote:
> Dear Group Members
>
> We are migrating from Lucent QIP to MetaIP for DHCP services and so
> far we have had two issues when MetaIP has been implemented for VLAN
> that has an unauthorized Linksys router giving out IP addresses.
>
> Is there a scanning tool out there that can determine if there are
> unauthorized Linksys (type) routers in a specific VLAN?
>
> Your input is appreciated
>
> Thank You
>
> Martin M
> http://dotsecure.blogspot.com
>

--
Dave Hull
ireadit (at) gmail (dot) com [email concealed]

[ reply ]
Re: Tool for Identifying Rogue Linksys Routers Aug 26 2005 02:32PM
Graham Wilson (graham mknod org)
Re: Tool for Identifying Rogue Linksys Routers Aug 26 2005 01:31PM
Mike Frantzen (frantzen nfr com)
Re: Tool for Identifying Rogue Linksys Routers Aug 25 2005 09:14PM
Joshua Wright (jwright hasborg com)


 

Privacy Statement
Copyright 2010, SecurityFocus