h-eibot / reaver-wps

Automatically exported from code.google.com/p/reaver-wps
0 stars 0 forks source link

MAC spoofing with raw frame injection questions #330

Open GoogleCodeExporter opened 8 years ago

GoogleCodeExporter commented 8 years ago
Just a few quick questions..

Why is mac spoofing done in a roundabout way? I was under the impression that 
we have the ability to send entirely cooked 802.11 frames complete with spoofed 
macs.

Given the ability to do on-the-fly mac spoofing, could we rapidly work around 
WPS attempt lockouts? Or, given an AP with sufficient computing power, to do 
more then one attack in parallel?

Original issue reported on code.google.com by teissler...@gmail.com on 12 Jun 2012 at 11:52