Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email firstname.lastname@example.org
RE: [Full-disclosure] Rogue Network Link Detection
From: Randall M (randallmfidmail.com)
Date: Tue Dec 06 2005 - 05:58:23 CST
::::Behalf Of H D Moore
::::Sent: Monday, December 05, 2005 11:42 PM
::::Subject: [Full-disclosure] Rogue Network Link Detection
::::"Unauthorized network links are one of the biggest problems
::::facing large enterprise networks. Users intent on bypassing
::::corporate proxies will often use cable modems, wireless
::::networks, or even full-fledged T1s to access the internet.
::::These network links can have a drastic affect on
::::organizational security; any perimeter access controls are
::::completely bypassed, making it nearly impossible for the
::::administrators to effectively concentrate their monitoring
::::and intrusion prevention efforts. This document attempts to
::::describe different approaches and techniques that can be
::::used to detect these rogue network links."
::::Full-Disclosure - We believe in it.
::::Hosted and sponsored by Secunia - http://secunia.com/
We FINALY fix that problem. We implemented VMPS/Vlans using MAC address. Any
rogue is placed in deny.
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/