Collecting the MAC
Addresses
The attacker gathers legitimate MAC addresses for use later in
constructing spoofed frames. The source and destination MAC addresses are
always in the clear in all the frames. There are two reasons why an
attacker would collect MAC addresses of stations and APs participating in a
wireless network.
(1) The attacker wishes to use these values in spoofed frames so that his station or AP is not identified.
(2) The targeted AP may be controlling access by filtering out frames with MAC addresses that were not registered.
(1) The attacker wishes to use these values in spoofed frames so that his station or AP is not identified.
(2) The targeted AP may be controlling access by filtering out frames with MAC addresses that were not registered.
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.