This is an old revision of this page, as edited by John of Reading (talk | contribs) at 16:19, 27 November 2012 (Typo/general fixing, replaced: eg → e.g. (2), added orphan tag using AWB (8686)). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.
Revision as of 16:19, 27 November 2012 by John of Reading (talk | contribs) (Typo/general fixing, replaced: eg → e.g. (2), added orphan tag using AWB (8686))(diff) ← Previous revision | Latest revision (diff) | Newer revision → (diff)This article is an orphan, as no other articles link to it. Please introduce links to this page from related articles; try the Find link tool for suggestions. (November 2012) |
A rogue system is any system in a wireless network that has been placed by third parties in range of the wireless network in order to gather information about it, penetrate it or other malicious activities.
Common systems
Common rogue systems or devices are:
- Fake AP's
- Concealable computers equipped with WiFi-cards and antenna's. Examples are e.g. handhelds, microcomputers, ... Microcomputers are often cheap, as they can be built DIY (e.g. Arduino, ECB ATmega32/644, ... )
- Trojan horses
- ...