So, yeah. The wpa_supplicant bug only lets you *impersonate* an AP. It does *NOT* let you MITM it or passively decrypt. This is important.
-
Show this thread
-
Replying to @marcan42
Are you sure? Which version of wpa_supplicant are you talking about? Seems like MITM worked in the demo-video.
1 reply 0 retweets 0 likes -
Replying to @sundhaug92
The demo video isn't a MITM of the AP, it's a total takeover with direct routing out to the internet. Note how he ran a script for that.
1 reply 0 retweets 0 likes -
Replying to @marcan42
Indeed you're correct (https://www.youtube.com/watch?v=sg-t7w8hAi0#t=1m14s …), though the effect is the same
2 replies 0 retweets 0 likes
Replying to @sundhaug92
Only for public services. Biggest (implied) impact of these WiFi bugs is for private networks. Many other attack scenarios for public ones.
2:45 PM - 17 Oct 2017
0 replies
0 retweets
2 likes
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.