Resources Video

Known Beacons

 

Summary

Excerpt From Wi-Fi Vulnerabilities Part 1 webinar
Learn More in This Video From CTO Dr. Brett Walkenhorst on Known Beacons
Known Beacon attacks work by exploiting common/known networks, like common public Wi-Fi networks or those gathered from Wi-Fi monitoring. By compiling a list of common public networks, an attacker can then beacon those networks out with the hopes of being able to carry out a rogue AP/evil twin type attack. Though admittedly less directed, this type of attack is nonetheless effective.

Video Transcript

And it but I could get them from anywhere. I could just compile a list of common public Wi Fi networks and beacon those out. And then when someone is aware that I'm nearby, they're gonna send me a probe that and

We’d love to show you around

Learn how Bastille can help you prepare you for today’s ever-growing wireless threat landscape, and schedule a demo and we’ll be in touch shortly.