I mean, sure, you could spoof a LAN and recover some auth credentials, but not MITM properly. And you need to know what to expect.
-
-
Replying to @marcan42
Mh? At this point you emulate an AP with a negotiated all-zero key. It's full MITM, just not through orig AP. At least how I understood it.
1 reply 0 retweets 0 likes -
Replying to @LiveOverflow
MITM means you're in the middle. He's not in the middle, he's routing to a totally different network. You can't MITM an intranet with this.
2 replies 0 retweets 1 like -
Replying to @marcan42 @LiveOverflow
you both are correct. Just a matter of how you define the intended MITM "outcome".
1 reply 0 retweets 0 likes -
also, if you are basing your security model ONLY on the "security" of your physical network (wired or wireless), you are doing it wrong.
1 reply 0 retweets 0 likes -
-
In a way I appreciate the FUD in the sense that it might help make people stop doing that. Maybe. I can have dreams, OK?
1 reply 0 retweets 0 likes -
Replying to @marcan42 @LiveOverflow
LOL, dream on! ;) But yeah FUD, some times have a positive educational side as well.
1 reply 0 retweets 0 likes -
speaking of which, google showed us today network security by incompatibility/proprietary hwpic.twitter.com/O5PmrbyeCp
1 reply 0 retweets 0 likes -
Replying to @itsvmme @LiveOverflow
I think that's marketroidese for "accelerates the crypto". Google's HW/SW designs are actually really solid.
1 reply 0 retweets 0 likes
Also Google knows a thing or two about not trusting the network. https://cloud.google.com/beyondcorp/
-
-
Replying to @marcan42 @LiveOverflow
and about building awesome looking custom network gearpic.twitter.com/0lDikJhKzk
0 replies 0 retweets 0 likesThanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.