Close Menu
    Facebook LinkedIn YouTube WhatsApp X (Twitter) Pinterest
    Trending
    • Portable water filter provides safe drinking water from any source
    • MAGA Is Increasingly Convinced the Trump Assassination Attempt Was Staged
    • NCAA seeks faster trial over DraftKings disputed March Madness branding case
    • AI Trusted Less Than Social Media and Airlines, With Grok Placing Last, Survey Says
    • Extragalactic Archaeology tells the ‘life story’ of a whole galaxy
    • Swedish semiconductor startup AlixLabs closes €15 million Series A to scale atomic-level etching technology
    • Republican Mutiny Sinks Trump’s Push to Extend Warrantless Surveillance
    • Yocha Dehe slams Vallejo Council over rushed casino deal approval process
    Facebook LinkedIn WhatsApp
    Times FeaturedTimes Featured
    Saturday, April 18
    • Home
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    • More
      • AI
      • Robotics
      • Industries
      • Global
    Times FeaturedTimes Featured
    Home»News»New AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprises
    News

    New AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprises

    Editor Times FeaturedBy Editor Times FeaturedMarch 1, 2026No Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email WhatsApp Copy Link

    “In a traditional Layer-2 change, the change learns the MAC of the consumer by seeing it reply with its supply handle,” Moore defined. “This assault confuses the AP into pondering that the consumer reconnected elsewhere, permitting an attacker to redirect Layer-2 visitors. In contrast to Ethernet switches, wi-fi APs can’t tie a bodily port on the gadget to a single consumer; shoppers are cell by design.”

    The back-and-forth flipping of the MAC from the attacker to the goal, and vice versa, can proceed for so long as the attacker desires. With that, the bidirectional MitM has been achieved. Attackers can then carry out a number of different assaults, each associated to AirSnitch or ones such because the cache poisoning mentioned earlier. Relying on the router the goal is utilizing, the assault might be carried out even when the attacker and goal are related to separate SSIDs related by the identical AP. In some instances, Zhou mentioned, the attacker may even be related from the Web.

    “Even when the visitor SSID has a unique title and password, it could nonetheless share elements of the identical inner community infrastructure as your essential Wi-Fi,” the researcher defined. “In some setups, that shared infrastructure can permit sudden connectivity between visitor units and trusted units.”

    No, enterprise defenses gained’t defend you

    Variations of the assault defeat the consumer isolation promised by makers of enterprise routers, which usually use credentials and a grasp encryption key which are distinctive to every consumer. One such assault works throughout a number of APs once they share a wired distribution system, as is frequent in enterprise and campus networks.

    Of their paper, AirSnitch: Demystifying and Breaking Client Isolation in Wi-Fi Networks, the researchers wrote:

    Though port stealing was initially devised for hosts on the identical change, we present that attackers can hijack MAC-to-port mappings at the next layer, i.e., on the degree of the distribution change—to intercept visitors to victims related to totally different APs. This escalates the assault past its conventional limits, breaking the idea that separate APs present efficient isolation.

    This discovery exposes a blind spot in consumer isolation: even bodily separated APs, broadcasting totally different SSIDs, supply ineffective isolation if related to a typical distribution system. By redirecting visitors on the distribution change, attackers can intercept and manipulate sufferer visitors throughout AP boundaries, increasing the risk mannequin for contemporary Wi-Fi networks.

    The researchers demonstrated that their assaults can allow the breakage of RADIUS, a centralized authentication protocol for enhanced security in enterprise networks. “By spoofing a gateway MAC and connecting to an AP,” the researchers wrote, “an attacker can steal uplink RADIUS packets.” The attacker can go on to crack a message authenticator that’s used for integrity safety and, from there, study a shared passphrase. “This enables the attacker to arrange a rogue RADIUS server and related rogue WPA2/3 entry level, which permits any legit consumer to attach, thereby intercepting their visitors and credentials.”



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Editor Times Featured
    • Website

    Related Posts

    NCAA seeks faster trial over DraftKings disputed March Madness branding case

    April 18, 2026

    Yocha Dehe slams Vallejo Council over rushed casino deal approval process

    April 18, 2026

    CFTC’s one-man show gets awkward on the Hill as lawmakers hammer Selig on sports bets, staffing gaps and corruption claims

    April 17, 2026

    Maryland session ends leaving sweepstakes gaming bills stalled once again as SGLA celebrates

    April 17, 2026

    New York lawsuit says Stake and Coinbase targeted child gambler for years

    April 17, 2026

    Recent advances push Big Tech closer to the Q-Day danger zone

    April 17, 2026

    Comments are closed.

    Editors Picks

    Portable water filter provides safe drinking water from any source

    April 18, 2026

    MAGA Is Increasingly Convinced the Trump Assassination Attempt Was Staged

    April 18, 2026

    NCAA seeks faster trial over DraftKings disputed March Madness branding case

    April 18, 2026

    AI Trusted Less Than Social Media and Airlines, With Grok Placing Last, Survey Says

    April 18, 2026
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    About Us
    About Us

    Welcome to Times Featured, an AI-driven entrepreneurship growth engine that is transforming the future of work, bridging the digital divide and encouraging younger community inclusion in the 4th Industrial Revolution, and nurturing new market leaders.

    Empowering the growth of profiles, leaders, entrepreneurs businesses, and startups on international landscape.

    Asia-Middle East-Europe-North America-Australia-Africa

    Facebook LinkedIn WhatsApp
    Featured Picks

    Trump says $72bn Netflix-Warner Bros deal ‘could be a problem’

    December 8, 2025

    Premier League Soccer: Stream Brentford vs. Liverpool Live From Anywhere

    October 25, 2025

    GAMING: The Halloween edition of the best villains and why they’re sometimes misunderstood

    October 31, 2025
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    Copyright © 2024 Timesfeatured.com IP Limited. All Rights.
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About us
    • Contact us

    Type above and press Enter to search. Press Esc to cancel.