Unlike previous Wi-Fi attacks, AirSnitch exploits core features in Layers 1 and 2 and the failure to bind and synchronize a client across these and higher layers, other nodes, and other network names such as SSIDs (Service Set Identifiers). This cross-layer identity desynchronization is the key driver of AirSnitch attacks.

The most powerful such attack is a full, bidirectional machine-in-the-middle (MitM) attack, meaning the attacker can view and modify data before it makes its way to the intended recipient. The attacker can be on the same SSID, a separate one, or even a separate network segment tied to the same AP. It works against small Wi-Fi networks in both homes and offices and large networks in enterprises.

  • Sanguine@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    2
    ·
    11 hours ago

    Correct me if I’m wrong, but the article does seem to indicate that isolation between VLANs is still secure assuming its set up correctly. A lot of folks set up VLANs but never complete the firewall rules afterwards.