Page 2 of 4 FirstFirst 1234 LastLast
Results 11 to 20 of 35

Thread: Mystery Machine Invades Network?

  1. #11
    Just Another Geek
    Join Date
    Jul 2002
    Location
    Rotterdam, Netherlands
    Posts
    3,401
    Looking further into 224.0.0.251 I came across this.
    That machine probably has AppleTalk installed.

    Found this too.
    Oliver's Law:
    Experience is something you don't get until just after you need it.

  2. #12
    Found it!

    But the answer is WIERD.

    I discovered that the MAC address I found was indeed connecting wirelessly. That meant it had to be one of our machines since I have MAC filtering enabled. Sure enough, that MAC belongs to one of our company laptops, however that laptop is NOT a Windows 2003 server (it's XP Pro) and is NOT named "MUJPOLEDNIK".

    So I'm going to find out who has that laptop right now and take a look at it...

  3. #13
    AO übergeek phishphreek's Avatar
    Join Date
    Jan 2002
    Posts
    4,325
    Your WIFI is on the same subnet as your wired hosts? You should have them on different subnets separated by a firewall... just in case something like this were to happen. then its easier to track down and lock out hosts on that subnet... 128bit encryption using WEP? The firewall between the subnets should limit the wireless hosts access to your wired lan.

    like sirdice said... nbtstat -a 192.168.1.200 and get the mac. then you can match it up.

    Since netbios is running, you can possibly get other useful info... such as user account logged in, which workgroup/domain it belongs to, etc. you can use nessus or languard or nbtstat or nbtscan, etc. there are a lot of tools out there that will give you that info.

    From your nbtstat you can determine the following

    Workstation Service
    Belongs to the "Workgroup" domian/workgroup
    Has file/print share service turned on
    Participates in browser service elections
    It is the master browser for that domain/workgroup

    BTW: If you are using WEP... its not very difficult to break. And MAC filtering? Does no good... a simple MAC spoofing program can get around that. You need to be using WPA along with some type of authentication server (VPN or Radius)
    Quitmzilla is a firefox extension that gives you stats on how long you have quit smoking, how much money you\'ve saved, how much you haven\'t smoked and recent milestones. Very helpful for people who quit smoking and used to smoke at their computers... Helps out with the urges.

  4. #14
    And it just gets stranger...

    That laptop that the MAC belongs to is turned off, sitting safely in a cabinet right now.

    Could this mean someone's cracked our WEP and spoofed the MAC as phis mentioned then?

  5. #15
    Regal Making Handler
    Join Date
    Jun 2002
    Posts
    1,668
    Looks like it, expect a letter from the Riaa. Lol
    Your scan does show port 6346/tcp gnuttela as open.
    What happens if a big asteroid hits the Earth? Judging from realistic simulations involving a sledge hammer and a common laboratory frog, we can assume it will be pretty bad. - Dave Barry

  6. #16
    Your scan does show port 6346/tcp gnuttela as open.
    So I don't know much about that. What's the purpose of that particular port?

  7. #17
    AO übergeek phishphreek's Avatar
    Join Date
    Jan 2002
    Posts
    4,325
    Your scan does show port 6346/tcp gnuttela as open.
    file sharing on the gnutella p2p network
    http://www.gnutella.com/

    Could this mean someone's cracked our WEP and spoofed the MAC as phis mentioned then?
    Sure. Wep is easy to crack. It can be done in minutes. Valid MACs can be found in seconds... they are not encrypted...

    Remove that MAC from your filters and see if they try to reconnect using a different MAC.
    Quitmzilla is a firefox extension that gives you stats on how long you have quit smoking, how much money you\'ve saved, how much you haven\'t smoked and recent milestones. Very helpful for people who quit smoking and used to smoke at their computers... Helps out with the urges.

  8. #18
    Regal Making Handler
    Join Date
    Jun 2002
    Posts
    1,668
    What happens if a big asteroid hits the Earth? Judging from realistic simulations involving a sledge hammer and a common laboratory frog, we can assume it will be pretty bad. - Dave Barry

  9. #19
    Senior Member
    Join Date
    Mar 2005
    Posts
    400

    Exclamation

    AngelicK,

    You have a physical or logical map of your network, no?
    Let's say you do, that means all managed switches and servers will show on the map as static IPs, the rest of the network, maybe excluding printers, are DHCP.

    With that information in hand, simply "tracert" the IP. (I'd suggest a GUI program that does the same thing but tracert is free).

    Then go to the next "static" IP reported in the tracert output and "tracert" again.
    If it gets too confusing, tracert from another couple locations on your network as a type of "triangulation".

    If all tracert's go thru the WAP, then exclude that MAC and see who complains.
    OR:
    In the mean time, you can use another laptop booted up with Knoppix STD CD (free download) to use Kismet to physically track the offender.

    Using Network Stumbler (runs under windows for free) to walk the general area looking for offending device will only give you active APs (with their MAC ID), sometimes you get the peer-to-peer connections, othertimes not.

    I'd also contact whomever had been using the laptop.
    It could be a former employee/technician who grabbed the data prior to leaving.
    ZT3000
    Beta tester of "0"s and "1"s"

  10. #20
    So, mystery solved! Turns out it's a laptop that belongs to one of our employees. He changed the name of his machine to that weird name above, thus throwing me off all morning long. All it took was kicking that MAC off the AP for me to get the "I lost my connection!" phone call.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •