Avatar feed
Responses: 1
SSG Derek Scheller
0
0
0
This is definitely interesting, although it looks like it still requires the victim to be connected to a rogue AP. This has been a fear and an issue for years when dealing with Public WiFi.
(0)
Comment
(0)
Maj William W. 'Bill' Price
Maj William W. 'Bill' Price
>1 y
True, SSG Derek Scheller, but the twist here is that I can craft and transmit a nonce packet that rekeys a client without notice, and I don't have to be an AP to do so. I then have access to the encrypted datastream from that client. IMHO company wifis might as well be public given the poor protection SSIDs and WPA2 keys receive. Hence the increases need for awareness, and hence my post to RP this morning.
(0)
Reply
(0)
SSG Derek Scheller
SSG Derek Scheller
>1 y
Maj William W. 'Bill' Price - Oh I agree, and that was where I was wondering if you needed to be an AP or not. IMHO I don't use any WiFi unless its on my home network. As for companies and the devices they use, it would require constant monitoring of people that could possibly be in range of their network. Limiting the range of your APs could help as well so that only those with a High Gain antenna could access your network at which point once you are a target and someone is dedicated enough to get in, there isn't much you can do at this point.
(1)
Reply
(0)
Avatar small

Join nearly 2 million former and current members of the US military, just like you.

close