Chapter

The Dangers of Fake Wi-Fi Access Points
listen on Spotify
41:58 - 46:54 (04:55)

Using a tool like Karma, hackers can create fake access points that can trick wireless clients into joining and giving up sensitive information. This method allows for easy exploitation and control over machines.

Clips
Learn how hackers can use Karma attacks to exploit the vulnerabilities of public Wi-Fi networks and spoofed access points to gain access to sensitive information and take over machines.
41:58 - 44:45 (02:46)
listen on Spotify
Cybersecurity
Summary

Learn how hackers can use Karma attacks to exploit the vulnerabilities of public Wi-Fi networks and spoofed access points to gain access to sensitive information and take over machines.

Chapter
The Dangers of Fake Wi-Fi Access Points
Episode
114: HD
Podcast
Darknet Diaries
The speaker discusses their approach to reporting vulnerabilities to vendors and a dead man's switch strategy they use to make sure vulnerabilities are addressed in a timely manner, citing the example of Trend Micro publicly disclosing zero days on HP due to the vendor not fixing their vulnerabilities quickly enough.
44:45 - 46:54 (02:09)
listen on Spotify
Cybersecurity
Summary

The speaker discusses their approach to reporting vulnerabilities to vendors and a dead man's switch strategy they use to make sure vulnerabilities are addressed in a timely manner, citing the example of Trend Micro publicly disclosing zero days on HP due to the vendor not fixing their vulnerabilities quickly enough.

Chapter
The Dangers of Fake Wi-Fi Access Points
Episode
114: HD
Podcast
Darknet Diaries