Video Hub
Video

Known Beacons

Excerpt From Wi-Fi Vulnerabilities Part 1 webinar
Learn More in This Video From CTO Dr. Brett Walkenhorst on Known Beacons
Known Beacon attacks work by exploiting common/known networks, like common public Wi-Fi networks or those gathered from Wi-Fi monitoring. By compiling a list of common public networks, an attacker can then beacon those networks out with the hopes of being able to carry out a rogue AP/evil twin type attack. Though admittedly less directed, this type of attack is nonetheless effective.

Close your cybersecurity gaps with AI-driven wireless visibility

See Bastille in action with a live demo from our experts in wireless threat detection.