[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Full-disclosure] how to bypass rouge machine detection techniques
- To: full-disclosure@xxxxxxxxxxxxxxxxx
- Subject: [Full-disclosure] how to bypass rouge machine detection techniques
- From: Gaurav Kumar <gkverma@xxxxxxxxx>
- Date: Mon, 11 Jul 2005 15:29:21 +0530
Friends,
There are several techniques available for detecting rouge (not being
a member of trusted domain) machines, such as active scanning, active
directory querying etc, but I guess most powerful being the one used
by epolicy orchestrator. Its agents (deployed on each subnet) checks
for L2 broadcasts like Arp broadcast etc. After detecting a broadcast,
it used the mac address and ip address to proceed further to detect
whether the machine is rouge or not.
http://www.networkassociates.com/us/local_content/white_papers/wp_epo3_5_rsdwhitepaper_july2004.pdf
I was wondering if this approach is foolproof and can be safely
deployed or if there is a way to bypass it?
Regards,
Gaurav
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/