Description: <div style="text-align: justify;">Wireless IEEE 802.11 protocol is vulnerable to many over the air attacks. The very nature of wireless medium leaks out the signal in uncontrolled fashion and physical access to the enterprise is not always necessary. This video series talks about different wireless attacks like De-authentication attack, planting rogue Access Point, client mis-association, RF jamming and many more such attacks. The videos explain the attacks along with the tools used to launch them and the possible protection technique. In MAC spoofing attack, the attacker goes ahead and changes the Media Access Control address of the device which is the device’s universally unique identity. By changing MAC address, one can impersonate the identity of someone else, there by bypassing the Access Control lists on routers and other networking infrastructure. For changing MAC address the simplest utility that comes with linux if “ifconfig” command. On Windows operating system SMAC like tools are available for changing the MAC address. In wireless LAN context, one can either spoof the MAC address of Access Point or of the client. To bypass the MAC specific access lists on AP, attacker often spoofs the MAC of the station. By spoofing the MAC address of the AP, the attacker can hide his existence and can send some packets. This video talks about different types of attacks possible with MAC spoofing.<br><br>Tags: wireless attacks, mac spoofing<br><br><br></div>
Tags: basics ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
I am trying to get into this wifi zone which is open, has no WEP or WPA/WPA2 encryption, gets connected but doesnt let me browse the web, I believe it has some specific MAC addresses registered within itself and allows access to only those. So people suggest me to get covered inside someone else's MAC address, thats the method I could use. But the problem is that no one actually uses that wifi so I am not able to get any of the registered MAC addresses. Is there anyway I could discover what MAC addresses are permitted? Or any other ways to exploit?