You forgot *BSD 
(OpenBSD/FreeBSD/NetBSD):
  - dstumbler:
  http://www.dachb0den.com/projects/bsd-airtools.html   prism2/Lucent


-Ron

On Sunday, June 9, 2002 at 19:28:14, Kroma Pierre wrote:
> perhaps you can try the following tools:
> 
> win:
> - netstumbler:        www.netstumbler.com     (Orinoco - chipset)
> - apsniff:    http://www.bretmounet.com/ApSniff/      (prism2)
> 
> linux:
> - kismet:     http://www.kismetwireless.net/  (prism2, cisco)
> - wellenreiter:       http://www.remote-exploit.org/  (prism2, cisco)
> 
> Best regards,
> 
> Pierre
> 
> 
> On Fri, 7 Jun 2002 18:22:13 -0000 
> Isherwood Jeff C Contr AFRL/IFOSS <[EMAIL PROTECTED]> wrote:
> 
> > I'm doing some research for a paper on wireless security, and I've been
> > trying to find a decent way for an administrator to probe his network for
> > APs that might be attached.
> > 
> > There seems to be very little out there for this sort of thing.
> > 
> > NMAP can recognize a fingerprint of some APs, but not all...
> > 
> > ISS can sweep a wire, and report back on any that have SNMP enabled...
> > 
> > APTOOLS claims to be capable, but isn't that easy to use or figure out (for
> > me so far)
> > 
> > 
> > Is there anything else out there?
> > 

----------------------------------------------------------------------------
This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
Service. For more information on SecurityFocus' SIA service which
automatically alerts you to the latest security vulnerabilities please see:
https://alerts.securityfocus.com/

Reply via email to