User Tools

Site Tools


cafe-latte

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Last revisionBoth sides next revision
cafe-latte [2009/12/27 23:25] – Corrrected for missing -b parameter darkaudaxcafe-latte [2010/03/07 00:20] – Updated links (were redirected to a new address) mister_x
Line 1: Line 1:
 ====== Cafe Latte attack ====== ====== Cafe Latte attack ======
- 
- 
 ===== Description ===== ===== Description =====
  
Line 8: Line 6:
 These links provide a detailed explanation of the attack plus some ways to protect yoursefl from it: These links provide a detailed explanation of the attack plus some ways to protect yoursefl from it:
  
-  * [[http://www.airtightnetworks.net/knowledgecenter/wep-caffelatte.html|Cafe Latte attack]]+  * [[http://www.airtightnetworks.com/home/resources/knowledge-center/caffe-latte.html|Cafe Latte attack]]
  
-  * [[http://www.esecurityplanet.com/prevention/article.php/3716656|The Caffe Latte Attack: How It Works—and How to Block It]]+  * [[http://www.esecurityplanet.com/trends/article.php/3716656/The-Caffe-Latte-Attack-How-It-Worksand-How-to-Block-It.htm|The Caffe Latte Attack: How It Works—and How to Block It]]
  
 Where did the attack name come from?  The concept is that a WEP key could be obtained from an innocent client at a coffee bar in the time it takes to drink your cafe latte. Where did the attack name come from?  The concept is that a WEP key could be obtained from an innocent client at a coffee bar in the time it takes to drink your cafe latte.
cafe-latte.txt · Last modified: 2010/11/21 15:52 by sleek