This report template uses Nessus plugin 11026 “Wireless Access Point Detection” to locate exposed management interfaces and rogue access points.
- June 26th 2012, version 1, SecurityCenter 4.4
- Required Tools: Nessus
- Download Example - Wireless Access Point Detection
- Download Template - Wireless Access Point Detection
The Tenable Blog Post entitled Scanning Embedded Systems In The Enterprise With Nessus was an invaluable source of information in obtaining plugin 11026 results for the example report using real wireless access points especially in regards to not overwhelming the TCP/IP stack on embedded systems by limiting a port scan to a few select ports. This type of tuned scanning might be scheduled separately in SecurityCenter and its results placed in a dedicated repository. It might also prompt an organization to investigate Tenable’s Passive Vulnerability Scanner as a compliment to Nessus to audit for embedded system vulnerabilities.