Time for action finding rogue access points
Follow the given instructions to get started:
- We dump a list of all MAC addresses on the switch of the clients network. In the most common case, the wired and wireless interface MAC addresses differ by 1. We find the following list of addresses on the switches:
00:24:B2:24:7E:BF that are close to the ones we saw in the air.
- These are close to the access points as shown in the screenshot:
- This brings us to the conclusion that the access point with ESSID
New NETGEAR and wireless MAC address
00:24:B2:24:7E:BE and wired-side MAC address
00:24:B2:24:7E:BF is a rogue device:
- We now use ...