473,408 Members | 2,888 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,408 software developers and data experts.

Detect Wireless Access Point

Hello, I am new to this community and I apologize if I am posting this
message under the wrong group. I am interested in writing a C# application
that can be used to detect unauthorized wireless access points in my
company's network. The basics behind the application is to run a scan on a
range of IP addresses, trying to find all access points, and report the
access points to a file/report/etc. On my first attempt, I created a small
application that allows for the entering of an IP address and I hit all
addresses on the subnet. I was using the httpwebrequest, hoping to get a
good return which would signal an access point. The problem is that this
implementation times out almost every time, instead of returning anything.

Can anyone suggest an alternative means or point to be some examples? I am
not looking for anything fancy, just a simple means for detecting wireless
access points using C# with NET framework 1.1.
Jul 4 '06 #1
3 5961
I would assume that there would have to be some sort of time out
involved when polling different IP addresses. BUT the bottleneck here
is the application waiting for a response, so perhaps you could keep
your same approach, but run multiple threads at a time?
Perhaps spark 255 threads to deal with all the IPs on a subnet, and
post their results to a database. Then repeat for the next subnet. That
way it should only take the same amount of time to do 1 as it takes to
do all 255.

Just be careful to limit your threads to 255 and not go overboard!
I'm not sure if even 255 is too many.

Coffmans wrote:
Hello, I am new to this community and I apologize if I am posting this
message under the wrong group. I am interested in writing a C# application
that can be used to detect unauthorized wireless access points in my
company's network. The basics behind the application is to run a scan on a
range of IP addresses, trying to find all access points, and report the
access points to a file/report/etc. On my first attempt, I created a small
application that allows for the entering of an IP address and I hit all
addresses on the subnet. I was using the httpwebrequest, hoping to get a
good return which would signal an access point. The problem is that this
implementation times out almost every time, instead of returning anything.

Can anyone suggest an alternative means or point to be some examples? I am
not looking for anything fancy, just a simple means for detecting wireless
access points using C# with NET framework 1.1.
Jul 5 '06 #2
Can you do it with a separate utility program? Try NetStumbler.

Jul 5 '06 #3
Coffmans wrote:
Hello, I am new to this community and I apologize if I am posting this
message under the wrong group. I am interested in writing a C#
application that can be used to detect unauthorized wireless access points
in my
company's network. The basics behind the application is to run a scan on
a range of IP addresses, trying to find all access points, and report the
access points to a file/report/etc. On my first attempt, I created a
small application that allows for the entering of an IP address and I hit
all
addresses on the subnet. I was using the httpwebrequest, hoping to get a
good return which would signal an access point. The problem is that this
implementation times out almost every time, instead of returning anything.

Can anyone suggest an alternative means or point to be some examples? I
am not looking for anything fancy, just a simple means for detecting
wireless access points using C# with NET framework 1.1.
Hi Coffmans,

I don't know if this will be of any help, but I see a Spanning-Tree-Protocol
packet every 2 seconds from my wireless access point on my network. Of
course, STP isn't just for wireless access points, it's used by managed
switches and routers and other exciting things, but it may be useful to
you. If you somehow managed to capture the STP packet, you may be able to
analyse it, and determine whether or not a MAC address is unauthorised, by
checking it against a list of authorised MAC addresses.

Just a thought.

--
Hope this helps,
Tom Spink
Jul 5 '06 #4

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

10
by: Ben Xia | last post by:
Is there some way can detect MAC address with PHP? any help will be appreciate. Ben
8
by: Peter Larsson | last post by:
Hi there, I've recently developed a VBA-program in Excel that fetches and presents data from a distant Access database over a wireless peer-to-peer network (both computers running Win XP Pro)....
3
by: Bruno Renato | last post by:
Hi people, I have a question about this.... How I modify the SSID of the Wireless connection?? I was developing a software in C# .NET 2003 and I need this feature. TKS... Bruno Renato C#...
4
by: Al | last post by:
Hi, Although my application perform nicely in wired network, the performance in wireless network is very bad (I have tested in 802.11b). Would appreciate if anyone could suggest how I can improve...
45
by: Arno R | last post by:
Hi all, I am about to distribute an A97-runtime app. which will be used on a LAN by approx. 30 users. The network is pretty good, but there are a few managers who have wireless laptops... Of...
16
by: google | last post by:
Hello, I am working on an Acc2003 app for my company. In the interest of reducing chances of corruption due to unstable network connectivity, I would like to either prevent users from running it...
6
by: dmcglynn | last post by:
Hello all.. I have a strange issue. I am trying to do an opendir via a UNC path, from my windows server to another windows machine. As long as my remote machine is on a physically wired...
1
by: inamul | last post by:
I cann't connect to my wireless since i removed an adware. I have tried everthing from installing Drivers to system restore. but nothing seems to work. Actaully i can conncet using network...
8
by: Bob Alston | last post by:
I just acquired a pro bono nonprofit client who has various problems with Access that they want me to address. In our initial discussion, they mentioned that their network is a LInksys wireless...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.