User Tools

Site Tools


cafe-latte

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Last revision Both sides next revision
cafe-latte [2009/12/27 23:25]
darkaudax Corrrected for missing -b parameter
cafe-latte [2010/03/07 00:20]
mister_x Updated links (were redirected to a new address)
Line 1: Line 1:
 ====== Cafe Latte attack ====== ====== Cafe Latte attack ======
- 
- 
 ===== Description ===== ===== Description =====
  
Line 8: Line 6:
 These links provide a detailed explanation of the attack plus some ways to protect yoursefl from it: These links provide a detailed explanation of the attack plus some ways to protect yoursefl from it:
  
-  * [[http://​www.airtightnetworks.net/knowledgecenter/wep-caffelatte.html|Cafe Latte attack]]+  * [[http://​www.airtightnetworks.com/home/resources/​knowledge-center/​caffe-latte.html|Cafe Latte attack]]
  
-  * [[http://​www.esecurityplanet.com/​prevention/​article.php/​3716656|The Caffe Latte Attack: How It Works—and How to Block It]]+  * [[http://​www.esecurityplanet.com/​trends/​article.php/​3716656/​The-Caffe-Latte-Attack-How-It-Worksand-How-to-Block-It.htm|The Caffe Latte Attack: How It Works—and How to Block It]]
  
 Where did the attack name come from?  The concept is that a WEP key could be obtained from an innocent client at a coffee bar in the time it takes to drink your cafe latte. Where did the attack name come from?  The concept is that a WEP key could be obtained from an innocent client at a coffee bar in the time it takes to drink your cafe latte.
cafe-latte.txt · Last modified: 2010/11/21 15:52 by sleek