Penetration Testing mailing list archives
Emulating a wireless access point
From: Steve Skoronski <skoronski () ctidata com>
Date: Mon, 13 Aug 2001 16:08:17 -0400
greetings, I have heard about wireless LAN attacks that involve 'overpowering' or competing with the real Access Point with your own. The idea is that the clients will automatically switch to your, higher powered AP, authenticate, and then you can sniff the authentication sequence. Has anyone seen software to emulate this on a PC/Laptop with a wi-fi card? Or should I go look for a used AP? TIA Steve ---------------------------------------------------------------------------- This list is provided by the SecurityFocus Security Intelligence Alert (SIA) Service. For more information on SecurityFocus' SIA service which automatically alerts you to the latest security vulnerabilities please see: https://alerts.securityfocus.com/
Current thread:
- Emulating a wireless access point Steve Skoronski (Aug 13)
- Re: Emulating a wireless access point Robert van der Meulen (Aug 13)
- Re: Emulating a wireless access point Thorsten Fischer (Aug 14)
- RE: Emulating a wireless access point Jason Lewis (Aug 14)
- <Possible follow-ups>
- RE: Emulating a wireless access point Jason Brvenik (Aug 14)
- RE: Emulating a wireless access point Meredith S (Aug 15)
- Re: Emulating a wireless access point Al Potter (Aug 15)
- RE: Emulating a wireless access point Meredith S (Aug 15)
- Re: Emulating a wireless access point Michael Boman (Aug 16)
- RE: Emulating a wireless access point Meredith S (Aug 15)
- Re: Emulating a wireless access point Robert van der Meulen (Aug 13)
- RE: Emulating a wireless access point Nicholas de Jong (Aug 14)
- RE: Emulating a wireless access point Jason Lewis (Aug 15)