RE: Emulating a wireless access point

From: Nicholas de Jong (nickat_private)
Date: Tue Aug 14 2001 - 08:18:37 PDT

  • Next message: Thorsten Fischer: "Re: Emulating a wireless access point"

    Same thing can be done with cell phones / mobile phones, thus a rouge
    "strong cell" in a high traffic area can yield many phone authentication
    sequences.  This further leads to profiling by watching which phones go by
    everyday and when...
    > -----Original Message-----
    > From: Steve Skoronski [mailto:skoronskiat_private]
    > Sent: Monday, August 13, 2001 4:08 PM
    > To: pen-testat_private
    > Subject: Emulating a wireless access point
    > greetings,
    >  I have heard about wireless LAN attacks that involve
    > 'overpowering'
    > or competing with the real Access Point with your own. The
    > idea is that the
    > clients will automatically switch to your, higher powered AP,
    > authenticate,
    > and then you can sniff the authentication sequence.
    This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
    Service. For more information on SecurityFocus' SIA service which
    automatically alerts you to the latest security vulnerabilities please see:

    This archive was generated by hypermail 2b30 : Tue Aug 14 2001 - 11:18:35 PDT