Quote:
Originally Posted by cliche
What is the real risk of someone being able to use the network without my permission? I'm thinking it would probably be a matter of sitting with a sniffer for a few minutes to 'steal' a recognised MAC address. Would it be that easy?
|
You have no encryption? Fire up your favorite network sniffer, and you should be able to find 'legal' MAC addresses pretty quickly. As soon as someone shuts off their computer or disconnects, you can connect to the network with a spoofed MAC. You can even match your IP and become pseudo-invisible.
If they're not gonna disconnect, you can boot them off. This requires two wifi cards or two computers. Have one card spoof the MAC, etc. of an AP and start flooding a computer with deassociate (disconnect) frames. Have the other card spoof the MAC, etc. of the computer you're booting and try to associate with the AP. Because you're drowning the target PC with a deassociate DOS attack, it'll be easy to override it.