cafe-latte
                Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| cafe-latte [2009/12/27 23:25] – Corrrected for missing -b parameter darkaudax | cafe-latte [2010/11/21 15:52] (current) – typos sleek | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| ====== Cafe Latte attack ====== | ====== Cafe Latte attack ====== | ||
| - | |||
| - | |||
| ===== Description ===== | ===== Description ===== | ||
| The Cafe Latte attack allows you to obtain a WEP key from a client system.  | The Cafe Latte attack allows you to obtain a WEP key from a client system.  | ||
| - | These links provide a detailed explanation of the attack plus some ways to protect  | + | These links provide a detailed explanation of the attack plus some ways to protect  | 
| - |   * [[http:// | + |   * [[http:// | 
| - |   * [[http:// | + |   * [[http:// | 
| Where did the attack name come from? The concept is that a WEP key could be obtained from an innocent client at a coffee bar in the time it takes to drink your cafe latte. | Where did the attack name come from? The concept is that a WEP key could be obtained from an innocent client at a coffee bar in the time it takes to drink your cafe latte. | ||
cafe-latte.1261952724.txt.gz · Last modified:  by darkaudax
                
                