Bug report: Wi-Fi Pineapple and a man in the middle attack | Truth in IT

Matt Knight, Researcher at Bastille Networks, reports on how the Wi-Fi Pineapple can be used to perpetrate a man-in-the-middle attack. To learn more about how to find unauthorized devices operating in your environment please visit bastille.net.

Bastille Networks,Matt Knight,software defined radio,security,internet of radios,internet of things,cyber security,data exfiltration,TSCM,internet of radios vulnerabilities,wi-fi pineapple,wifi pineapple,man in the middle attack,covert listening devices

Bug report: Wi-Fi Pineapple and a man in the middle attack

Published by: Ekovox
Date: 12/03/2017
Views: 32
Embed

Matt Knight, Researcher at Bastille Networks, reports on how the Wi-Fi Pineapple can be used to perpetrate a man-in-the-middle attack. To learn more about how to find unauthorized devices operating in your environment please visit bastille.net.

Tags: