This is an old revision of this page, as edited by Hebrides (talk | contribs) at 09:06, 1 November 2009 (clean up, Replaced: be build → be built, using AWB). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.
Revision as of 09:06, 1 November 2009 by Hebrides (talk | contribs) (clean up, Replaced: be build → be built, using AWB)(diff) ← Previous revision | Latest revision (diff) | Newer revision → (diff)A rogue system is any system in a wireless network that has been placed by third parties in range of the wireless network in order to gather information about it, penetrate it or other malicious activities.
Common systems
Common rogue systems or devices are:
- Fake AP's
- Conceilable computers equipped with WiFi-cards and antenna's. Examples are eg handhelds, microcomputers, ... Microcomputers are often cheap, as they can be built DIY (eg Arduino, ECB ATmega32/644, ... )
- Trojan horses
- ...