Scan QR code or get instant email to install app
Question:
If users have been connecting but the AP does not show them connecting, then they have been connecting to a rogue access point. This could be the trigger of an architecture and design weakness such as a network without segmentation and control of devices connecting to the network. Session hijacking involves taking over an already authenticated session. Most session hijacking attacks involve impersonation. The attacker attempts to gain access to another user’s session by posing as that user. Clickjacking involves causing visitors to a website to click on the wrong item. Finally, bluejacking is a Bluetooth attack.
Comments