Same thing can be done with cell phones / mobile phones, thus a rouge "strong cell" in a high traffic area can yield many phone authentication sequences. This further leads to profiling by watching which phones go by everyday and when... Nick > -----Original Message----- > From: Steve Skoronski [mailto:skoronskiat_private] > Sent: Monday, August 13, 2001 4:08 PM > To: pen-testat_private > Subject: Emulating a wireless access point > > greetings, > > I have heard about wireless LAN attacks that involve > 'overpowering' > or competing with the real Access Point with your own. The > idea is that the > clients will automatically switch to your, higher powered AP, > authenticate, > and then you can sniff the authentication sequence. ---------------------------------------------------------------------------- This list is provided by the SecurityFocus Security Intelligence Alert (SIA) Service. For more information on SecurityFocus' SIA service which automatically alerts you to the latest security vulnerabilities please see: https://alerts.securityfocus.com/
This archive was generated by hypermail 2b30 : Tue Aug 14 2001 - 11:18:35 PDT