Known Beacons

Excerpt From Wi-Fi Vulnerabilities Part 1 webinar

Learn More in This Video From CTO Dr. Brett Walkenhorst on Known Beacons

Known Beacon attacks work by exploiting common/known networks, like common public Wi-Fi networks or those gathered from Wi-Fi monitoring. By compiling a list of common public networks, an attacker can then beacon those networks out with the hopes of being able to carry out a rogue AP/evil twin type attack. Though admittedly less directed, this type of attack is nonetheless effective.