Penetration Testing mailing list archives

RE: Emulating a wireless access point


From: "Nicholas de Jong" <nick () infilsec com>
Date: Tue, 14 Aug 2001 11:18:37 -0400

Same thing can be done with cell phones / mobile phones, thus a rouge
"strong cell" in a high traffic area can yield many phone authentication
sequences.  This further leads to profiling by watching which phones go by
everyday and when...

Nick


-----Original Message-----
From: Steve Skoronski [mailto:skoronski () ctidata com]
Sent: Monday, August 13, 2001 4:08 PM
To: pen-test () securityfocus com
Subject: Emulating a wireless access point

greetings,

 I have heard about wireless LAN attacks that involve
'overpowering'
or competing with the real Access Point with your own. The
idea is that the
clients will automatically switch to your, higher powered AP,
authenticate,
and then you can sniff the authentication sequence.


----------------------------------------------------------------------------
This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
Service. For more information on SecurityFocus' SIA service which
automatically alerts you to the latest security vulnerabilities please see:
https://alerts.securityfocus.com/


Current thread: