Abusive WI-FI vulnerability?
-
So i changed work location, and i noticed last week that i was connected to wi-fi.... i have never ever connected myself to this router...
The name of the Wifi Network is the same as my old work location, does that mean it only checks name and password? no SSID check or anything?
If that is the case i could easily make a hotspot to make people connect to me instead of the real network.
-
I'm not clear if your rogue hotspot is programmed with the same passphrase as the normal one, if yes, the phone will connect.
If you don't like that, you could investigate the use of WPA-Enterprise. The UT UI does not support it but it's possible to configure wifi with nmcli so it could work. Hopefully

-
@nbdynl This problem is not specific to UT, it is in fact how aircrack works. It forces the device to disconnect and captures the handshake when it attempts to reconnect. The good thing is that the handshake doesn't have the actual password in plain text, so to perform such an attack you have to know the password (and of course be in proximity to the client).
-
@ikoz i see, so it is that easy on public hotspots in general unregardless of the os i use, that uhh sucks
Hello! It looks like you're interested in this conversation, but you don't have an account yet.
Getting fed up of having to scroll through the same posts each visit? When you register for an account, you'll always come back to exactly where you were before, and choose to be notified of new replies (either via email, or push notification). You'll also be able to save bookmarks and upvote posts to show your appreciation to other community members.
With your input, this post could be even better 💗
Register Login