Originally posted by: spidey07
Originally posted by: Baloo
Originally posted by: RadiclDreamer
Originally posted by: Fritzo
MAC spoofing?
But first you need to be able to find the mac of an allowed client...which isnt too awfully hard
If you can't access the network, it can be very difficult.
It is extremely trivial to get the mac address. With some utilities, it's a one click deal.
1) Find allowed client MAC
2) Associate and communicate over wireless net
3) Run every known exploit possible against users machine
4) Or if you bored, just capture all their traffic for later analysis (find passwords, capture cookies, etc)
Secure your network.