Description: this video explains in detail about rogue access point and fundamental concept of detecting it.
normally people understand that they can do wireless vulnerability scanning,assessment and detection from the wired side only but that does not work.
now the question arises what is the fundamental method to detect rogue ap ? for this the wired side traffic is matched with wireless side traffic and try to detect if any device is transferring traffic between these two side. so we need wired side visibility and we need wireless side visibility to detect the rogue ap.
if we think only about wired side then we cant do pattern matching. it is also impossible to maintain signature based database of software,hardware,firmware to detect the rogue access point. rogue access point can be configured in various way and some configuration can not be reached from wired side,this means we can not take fingerprint.
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
excellent content by airtight network. got the concept behind detecting the rogue Ap.
Nice Talk On Rouge AP. Online any wireless vulnerability assessment software available ?