Excerpt From Wi-Fi Vulnerabilities Part 1 webinar
Learn More in This Video From CTO Dr. Brett Walkenhorst on Known Beacons
Known Beacon attacks work by exploiting common/known networks, like common public Wi-Fi networks or those gathered from Wi-Fi monitoring. By compiling a list of common public networks, an attacker can then beacon those networks out with the hopes of being able to carry out a rogue AP/evil twin type attack. Though admittedly less directed, this type of attack is nonetheless effective.
Emerging Tech: Security — The Need for Wireless Airspace Defense
Download now