AirSnitch: Demystifying and Breaking

Source provenance. Raw material catalogued for the wiki ingest pipeline. Lives offline at raw_sources/offensive-security/ingested/AirSnitch - Demystifying and Breaking.md.

Status: integrated

Excerpt

not enforce client isolation at the IP layer, it will forward the datagram to its destination i.e., the victim client on the Wi-Fi network, allowing the attacker to reach the “layer-2 isolated” victim clients. We call this thegateway bouncingattack. Third,we find that spoofing the victim’s MAC address while connecting to the same network (but possibly a different AP) as the victim, enables the att…