Wednesday, October 23, 2002
Tools for detecting rogue wireless LAN users - Computerworld I particularly like IBM's Distributed Wireless Security Auditor, which takes a P2P approach to identifying rogue wireless access points in the enterprise. It uses network clients that are wireless-enabled to search their local areas for access points. The clients report what they find back to a central process which matches sniffed APs with a list of authorized devices. Pretty cool.