Talk With an Expert

Discovering Rogue Wireless Access Points Using Kismet and Disposable Hardware

Discovering Rogue Wireless Access Points Using Kismet and Disposable Hardware (PDF, 3.03MB)Published: 07 Dec, 2006
Created by
Larry Pesce
Larry Pesce

PAM is the ability to identify a service that is being offered on a host by passively analyzing its traffic. Meaning we don't generate any traffic from our utility to determine what is being offering. This gives us the ability to safely map a host where scanning has the potential of causing damage to a server. As traffic on a network is watched, a PAM sensor will detect certain characteristics of what you would expect an application to generate. By doing this, PAM can make a determination as to what is being offered. Knowing what service is being attacked and its version gives us invaluable infto use these types of technology to detect rougue access points.

Meet the expert

Larry Pesce
Larry Pesce

Larry Pesce

Senior Instructor

Larry has revolutionized embedded device security with decades of hands-on offensive research, co-authoring SANS's flagship wireless and IoT penetration testing courses, and pioneering SBOM exploitation techniques for supply chain defense strategies.

Read more about Larry Pesce