Results 1 to 3 of 3

Thread: Illegal Wireless Access Points detect

  1. #1
    Join Date
    Jul 2010
    Posts
    142

    Illegal Wireless Access Points detect

    In the WLAN you can work comfortably. No matter which room you happen to be when the laptop has a connection, one can easily in the network work. The necessary infrastructure such as access points are cheap and in the standards set up quickly. In principle, provide the access points with WPA, a secure encryption of data traffic. If the wireless access points built into the infrastructure of the IT and administrators know, the risk of compromise is relatively low. Problems to do when employees try yourself, bring up a wireless network and not deny with the administrators. Quick then dangerous half-knowledge is used. For example, since the traffic is not encrypted or not sufficiently or passwords are left at the default settings. These "wild" access points often depend also on the corporate LAN and only permit one access to the Internet and access to shared data. The problem is that wireless networks do not adhere to the limits of the company. Current WLAN products easily create a range of up to 100 meters, walls can limit this, of course. Enough range, then, war drivers to deliver a sufficiently strong signal. You can protect your network by disabling the access points available or integrated into the security structure of the network. But first, the access points are found for now.

  2. #2
    Join Date
    Jul 2010
    Posts
    142

    Re: Illegal Wireless Access Points detect

    Netstumbler is one of the largest wireless scanner for Windows . The scanner has arrived in version 0.40. It runs with Windows XP and 2000 and supports a large number of wireless cards, including the most built-in laptop models. A comprehensive list of compatible cards can be found. After the download of about 1.3 Mbyte file to start the installation by double-clicking. Netstumbler requires only a working, compatible wireless card, this is present, then theoretically no further configuration to be made. When you first start Netstumbler is already looking for existing Wi-Fi card and begins scanning. Once an access point was discovered, you will hear a steady tone. The active access point receives a green circle. Next door we find the MAC address and the SSID. Subsequent follow the channel used, the maximum speed and the manufacturer if it can be read out. Interestingly, the Type field, this can be seen is whether this is a peer-to-peer network or an access point. Peer-to-peer can also be accidentally activated a wireless network card point. Try to find the settings yet, even here door opens into their network. If the access point is encrypted, you will get this also displayed. The other fields contain data for general signal strength when the wireless access was first seen and when last.

    Scripts and GPS

    Netstumbler also offers a basic configuration. Here you can change as the scanning speed. Interestingly, the points for scripting and GPS. Netstumbler support multiple protocols so that different manufacturers of positioning appliances. The Positions-date of detected access points can be in various card programs to import and plot. Programmers can extend the scanner with your own scripts. The Netstumbler community has already released some interesting scripts.

  3. #3
    Join Date
    Jul 2010
    Posts
    142

    Re: Illegal Wireless Access Points detect

    The smaller brother of Netstumbler is the original in every way. The software was written for mobile devices such as PDAs. If the internal card supports MiniStumbler offers the same functions. After the first start the program displays all found in the PC wireless adapter. These can then sit in a scan mode. Discovered the program a wireless signal, it tries to read the MAC address. This is then compared with known addresses. If the address is known, it lists AirSnare in the "Friendly MAC Addresses" on. An unknown address is considered as a potential intruder and end up in "Unfriendly MAC Addresses. Is selected in the "Tracking" option "Track with Ethereal" AirSnare immediately start the Ethereal network logger whenever a new MAC is identified. For each new unknown MAC address, a new instance of Ethereal is called, which in turn immediately to the network traffic records. This is stored in log files and can be evaluated later. Airsnaire warns remote administrators when a new MAC in the network shows up. Once done, the program included AirMail. In the Options menu can be a SMTP server and enter any set number of recipients. You may want to adjust the sender, subject and the message itself, the option "Server Wait" tells the program how many seconds there were between the sending of individual messages. A useful idea is to select airhorn. This sent on request to any new address found a short message that can be customized as desired. It makes sense for example to explain the rules of the network and to give an indication that all connections are monitored.The last two points in the options menu are self explanatory. In the "tracking" you select the specific tracking type. In the case of Ethereal you may need to adjust the path. In addition, you can specify which names to the log files. The item "Startup" AirSnare adapts to the startup. Here you can specify a network adapter on which the start of the program, the monitoring begins. The option ensures that the program is constantly in the background, the compounds monitored, and only appears when something unusual was found.

Similar Threads

  1. How to setup all Wi-Fi Access Points with the same SSID?
    By AlpAnA$ in forum Technology & Internet
    Replies: 10
    Last Post: 06-10-2011, 03:12 AM
  2. Replies: 5
    Last Post: 05-09-2011, 08:15 AM
  3. How to cascade router using 2 access points
    By Usha Kiran in forum Networking & Security
    Replies: 4
    Last Post: 15-04-2011, 10:22 AM
  4. Problem with Nokia e70 access points
    By popeye in forum Portable Devices
    Replies: 2
    Last Post: 06-02-2009, 03:12 PM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,751,426,328.34350 seconds with 16 queries