These can be used to improve the performance of Show that commodity Wi-Fi devices use predictable scrambler seeds. Much as 50% of devices for at least 20 minutes. We demonstrate that our algorithm can correctly track as We then combine theseįingerprints with incremental sequence numbers, to createĪ tracking algorithm that does not rely on unique identifiers such as MAC addresses. This shows that using random MAC addresses, on its own,įirst, we show that information elements in probe requestsĬan be used to fingerprint devices. Mobile devices by abusing features of the Wi-Fi standard. We present several novel techniques to track (unassociated) This would allow you to match two spoofed MAC addresses as belonging to the same machine, and apply a block to that new MAC address. You may be able to fingerprint the MAC address, and in some cases, even discover the original, unspoofed address. I'm leaving this here because it is a possible technique and it works. This is a theoretical technique and may not be practical without putting in sufficient effort to develop and test your own detection tool.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |