WiFi Wevenge

Turnabout is fair play with this WiFi bug that lets you fend off - or attack - an attacker

Dark Reading Staff, Dark Reading

April 16, 2007

1 Min Read
Dark Reading logo in a gray background | Dark Reading

5:45 PM -- Picture a couple of WiFi hackers inadvertently "bumping" into one another at a coffee shop: The first is running the open-source Aircrack-ng toolset to surreptitiously collect packets from the wireless network, including those of the second hacker. Then, surprise: The victimized hacker fights back with a counterattack that takes advantage of a new bug found in the hacker tool.

A recently disclosed exploit uses a newly discovered buffer overflow bug in the Airodump-ng tool in the Aircrack toolset. It basically lets a victim fight back, either by stopping the hacker in his tracks, or launching an attack on him, complete with remote-code execution.

But fun as this sounds, your typical WiFi user won't get the satisfaction of sticking it to the attacker. It's really limited to the hacker set, of course. But we can always dream.

— Kelly Jackson Higgins, Senior Editor, Dark Reading

About the Author

Dark Reading Staff

Dark Reading

Dark Reading is a leading cybersecurity media site.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights