Re: Mitigation
The attack is against the client, not so much the access point. It tricks the client into talking to a fake access point using a replay of a genuine exchange. So it needs to happen within range of home or work or wherever.
The attack is against the client, not so much the access point. It tricks the client into talking to a fake access point using a replay of a genuine exchange. So it needs to happen within range of home or work or wherever.