Page 2 of 2 FirstFirst 12
Results 11 to 14 of 14

Thread: Home routers search

  1. #11
    Junior Member
    Join Date
    May 2003
    Posts
    7
    I understand that you can change the mac address. I estimate that in my environment 1 out of 5 Routers installed might spoof the mac. I'd like to expose 2 or 3 people and make examples out of them. Most of these people are not aware of the policy.

    Anyways, thanks for the info on passive fingerprinting.

  2. #12
    AO Ancient: Team Leader
    Join Date
    Oct 2002
    Posts
    5,197
    P0f is excellent. I have it running constantly outside my firewall to glean every last little bit of info about an attacker. It's really ratehr accurate too in the tests I have run against it. It will ID the routers even if they are mac spoofing.
    Don\'t SYN us.... We\'ll SYN you.....
    \"A nation that draws too broad a difference between its scholars and its warriors will have its thinking done by cowards, and its fighting done by fools.\" - Thucydides

  3. #13
    Senior Member
    Join Date
    Nov 2002
    Posts
    186
    I really hate to bring up a thread that has been dormant for months, but has anyone else out there ever done any work on this? I am trying to identify anyone running home gateway/routers on our network and this is one of the more informative pieces of information I have come across.

    I was looking into using nMap, but it takes a serious amount of time (especially when multiplied by thousands of machines). The happens because each port is looked at during the OS fingerprinting. If it were possible to narrow it down to a few ports and only have to make the scan on those few ports, this might be a more feasible option. Let me know what you think or if you have any other suggestions. Thanks!
    \"When you say best friends, it means friends forever\" Brand New
    \"Best friends means I pulled the trigger
    Best friends means you get what you deserve\" Taking Back Sunday
    Visit alastairgrant.ca

  4. #14
    AO Ancient: Team Leader
    Join Date
    Oct 2002
    Posts
    5,197
    I would still recommend p0f from here placed just inside the gateway(s). Being on the inside you should get an accurate indication of the machine type of any machine that tries to reach the public network. Monitor it every day or so to see if you get anything come up with anything other than a viable OS guess.
    Don\'t SYN us.... We\'ll SYN you.....
    \"A nation that draws too broad a difference between its scholars and its warriors will have its thinking done by cowards, and its fighting done by fools.\" - Thucydides

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •