Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality. Learn more →
Macstealer Alternatives
Similar projects and alternatives to macstealer
-
super
📡 SPR: Open Source, secure, user friendly and fast wifi routers for your home. One wifi password per device. Ad Blocking & Privacy Blocklists. Policy Based Network Access (by spr-networks)
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
macstealer reviews and mentions
- MacStealer allows for WiFi client isolation bypasses (CVE-2022-47522)
- MacStealer allow for WiFi client isolation bypasses (CVE-2022-47522)
- WiFi client isolation bypasses (CVE-2022-47522)
-
iOS lets carriers add WiFi networks that you can’t remove or stop from joining
The knowledge and equipment to hack WiFi-related systems is a lot easier to obtain on most of the world than the cellular equivalent.
In the US, at least, tampering with cell service risks getting the FCC involved, so very few people do it compared to WiFi hacking.
I'm very curious, for example, if the devices that connect to these APs are vulnerable to the WiFi client isolation bypass that was disclosed about a week ago.[1] That seems a lot scarier when there are potentially thousands of random people's personal phones connecting to the same WiFi infrastructure instead of a bunch of more or less trusted corporate devices in an office.
[1] https://github.com/vanhoefm/macstealer
- MacStealer: Wi-Fi Client Isolation Bypass
-
WiFi protocol flaw allows attackers to hijack network traffic
This attack does require bypassing some network security already. It defeats client isolation but the attacker does need to be on the WiFi network already (according to https://github.com/vanhoefm/macstealer).
AP isolation is usually off for all but big hotspots in my experience. This will be a problem for people using AP isolation for preventing their IoT from connecting to other devices in their network, assuming their IoT is malicious, but other than that the risk seems to be mostly with professional/corporate networks.
-
A note from our sponsor - InfluxDB
www.influxdata.com | 7 May 2024
Stats
vanhoefm/macstealer is an open source project licensed under GNU General Public License v3.0 or later which is an OSI approved license.
The primary programming language of macstealer is C.
Popular Comparisons
Sponsored