AccessPoint may be created by a user to bring a laptop to the lounge and the user can still access the internet. An internal engineer may also installWirelessVro, build a test network by yourself, but you may forget to disable the wireless network after the test. These people who build unauthorized access points are often not malicious, but it cannot be said that these access points are harmless. If you think that attackers will not find wireless connections or use these connections, you may want to use Google to search for the dangers related to TJX and then check your network.
NetStumbler, Kismet, and other software tools are useful for identifying access points in a region, but they do not provide much information. Are you sure you want to ask, are these access points located on your network, on your company's network, or on a neighbor's network? Unless your organization is in a region with few units, these tools will not tell you all the required aspects. In short, these tools have limited functions.
Another option is to scan your network to see if there are abnormal MAC addresses. Although such scanning may be too time-consuming and may cause errors. This method is often used to scan the MAC addresses registered to devices such as D-Link. However, this method may not be effective because many large companies have acquired small vendors. For example, because Cisco acquired Linksys, the MAC address is displayed as Cisco. If you have a list of well-known MAC addresses in your organization, you can scan any device that has not been licensed. However, if you do not have a detailed list of devices, you cannot start. This method may not be too effective. Even if your network check is normal, MAC address scanning may not be effective. This is because the devices may move in the network, or the devices may not respond to the Ping operation, or the devices may turn off the power during scanning.
Some Wireless Access Point vendors have built the detection function of rogue access points into their products. This product can identify the Access Point Based on Wireless signals and track the AP through the network. This product can confirm the network port and allow you to control it. However, note that these products are not cheap.
No matter what technology or technique you use to track rogue access points, the key lies in regular searches. Pci dss (Payment Card Industry Data Security Standard) requires scanning every quarter, but we think it is better to search more frequently. You also need to be prepared for what measures should be taken after an unauthorized access point is discovered.
Be careful. If you need to build a test network, IT can take some time to provide a switch, and IT cannot be "killed by a stick ". Find a switch and move the connection over. If the user only needs wireless connection, disconnect the device and explain to him the risks that the device may bring to the company. A better solution is to see if you can establish an authorized wireless access in that place. Other users will like it very much. If you have not written a written policy on an unauthorized access point, do it with pleasure to allow the entire Organization to access the internet according to the security policy?