AirSnitch: Demystifying and Breaking
Source provenance. Raw material catalogued for the wiki ingest pipeline. Lives offline at
raw_sources/offensive-security/ingested/AirSnitch - Demystifying and Breaking.md.
Status: integrated
Excerpt
not enforce client isolation at the IP layer, it will forward the datagram to its destination i.e., the victim client on the Wi-Fi network, allowing the attacker to reach the “layer-2 isolated” victim clients. We call this thegateway bouncingattack. Third,we find that spoofing the victim’s MAC address while connecting to the same network (but possibly a different AP) as the victim, enables the att…
