Just a few quick questions..
Why is mac spoofing done in a roundabout way? I was under the impression that
we have the ability to send entirely cooked 802.11 frames complete with spoofed
macs.
Given the ability to do on-the-fly mac spoofing, could we rapidly work around
WPS attempt lockouts? Or, given an AP with sufficient computing power, to do
more then one attack in parallel?
Original issue reported on code.google.com by teissler...@gmail.com on 12 Jun 2012 at 11:52
Original issue reported on code.google.com by
teissler...@gmail.com
on 12 Jun 2012 at 11:52