Excerpt From wi-fi Vulnerabilities Part 1 Webinar
Learn About KARMA/MANA in the video below.
Dr. Brett Walkenhorst, CTO, discusses the tactics and development of evil twin attacks, focusing on the Karma/Mana family of attacks. In the video below, he describes how attackers use clients’ probe requests to position themselves as trusted networks. In order to maximize the likelihood of acquiring clients, the “Loud Mana” version continuously beacons out all accumulated network information.
Emerging Tech: Security — The Need for Wireless Airspace Defense
Download now