|
BugTraq
Tool for Identifying Rogue Linksys Routers Aug 25 2005 06:48PM Martin Mkrtchian (dotsecure gmail com) (5 replies) Re: Tool for Identifying Rogue Linksys Routers Aug 27 2005 12:13AM Tony Rall (trall almaden ibm com) Re: Tool for Identifying Rogue Linksys Routers Aug 25 2005 09:14PM Joshua Wright (jwright hasborg com) |
|
Privacy Statement |
to use DHCPFingerprint to locate them when they renew their leases.
You may want to contact the folks at http://www.packetfence.org. They
may have a more comprehensive list of signatures.
Also, nmap may work, see
http://seclists.org/lists/nmap-dev/2003/Apr-Jun/0010.html for more
details.
Examining TTLs of packets coming from edge devices may also give you
some indication of who's sitting behind an extra hop, though some
folks may be savvy enough to tweak this on their workstations to avoid
detection.
Good luck.
On 8/25/05, Martin Mkrtchian <dotsecure (at) gmail (dot) com [email concealed]> wrote:
> Dear Group Members
>
> We are migrating from Lucent QIP to MetaIP for DHCP services and so
> far we have had two issues when MetaIP has been implemented for VLAN
> that has an unauthorized Linksys router giving out IP addresses.
>
> Is there a scanning tool out there that can determine if there are
> unauthorized Linksys (type) routers in a specific VLAN?
>
> Your input is appreciated
>
> Thank You
>
> Martin M
> http://dotsecure.blogspot.com
>
--
Dave Hull
ireadit (at) gmail (dot) com [email concealed]
[ reply ]