Revision as of 09:06, 1 November 2009 editHebrides (talk | contribs)Autopatrolled, Extended confirmed users, Pending changes reviewers105,219 editsm clean up, Replaced: be build → be built, using AWB← Previous edit | Revision as of 10:10, 9 November 2011 edit undoBomazi (talk | contribs)Extended confirmed users3,446 editsm Disambiguated: Fake AP → Rogue access pointNext edit → | ||
Line 3: | Line 3: | ||
==Common systems== | ==Common systems== | ||
Common rogue systems or devices are: | Common rogue systems or devices are: | ||
* ]'s | * ]'s | ||
* Conceilable ] equipped with WiFi-cards and antenna's. Examples are eg handhelds, microcomputers, ... Microcomputers are often cheap, as they can be built DIY (eg ], ], ... ) | * Conceilable ] equipped with WiFi-cards and antenna's. Examples are eg handhelds, microcomputers, ... Microcomputers are often cheap, as they can be built DIY (eg ], ], ... ) | ||
* ]s | * ]s |
Revision as of 10:10, 9 November 2011
A rogue system is any system in a wireless network that has been placed by third parties in range of the wireless network in order to gather information about it, penetrate it or other malicious activities.
Common systems
Common rogue systems or devices are:
- Fake AP's
- Conceilable computers equipped with WiFi-cards and antenna's. Examples are eg handhelds, microcomputers, ... Microcomputers are often cheap, as they can be built DIY (eg Arduino, ECB ATmega32/644, ... )
- Trojan horses
- ...