Feature request Karma Attack #1290
Gosheto1234
started this conversation in
General
Replies: 4 comments
-
|
And also its of great importance that we add the fact that almost every
company nowadays , demand that we act under such strict conditions , even
the smaller companies most likely will ask for such competence . As
securing every aspect , every detail, that a bad actor and the hackers
could potentially do with a compromised system (specially windows) is
allways needed.
As one great Boss that wanted a complete security check told "Well i dont
care how you do it as long as you do it, because if we dont exploit all the
weaknesses and flaws that DO EXIST out there then we will fall behind and i
dont want my company to fall behind anything.. So do all your magic find
all the bugs and sources of bad, so its possible to fix it BEFORE the bad
happens... " So it was done... Even the Data Interception we needed to
fulfill a great care of as the Boss told .. And that was not a small
company --..
After a complete success.... Big Boss told us " There you go , if you aint
living on the edge your taking up to much space..." =)))))
And who are we to say no to the Big Boss..
…On Fri, Mar 21, 2025 at 10:25 PM Gosheto1234 ***@***.***> wrote:
*Is your feature request related to a problem? Please describe.*
No
*Describe the solution you'd like*
Can you add Karma attack in the future ?
*Describe alternatives you've considered*
*Additional context*
A Karma attack is a cybersecurity exploit targeting the automatic Wi-Fi
connection behaviors of client devices like smartphones, laptops, and
tablets. These devices often have a feature that remembers previously
connected Wi-Fi networks and attempts to reconnect to them automatically
for user convenience. This process involves the device broadcasting 'probe
requests' to detect known networks in the vicinity.
In a Karma attack, an attacker leverages this behavior by monitoring these
probe requests in public areas. The attacker then sets up a rogue Wi-Fi
access point mimicking the SSID (network name) from the device's probe
request. Believing this to be a trusted network, the device automatically
connects to the malicious access point without user intervention.
Once connected, the attacker can execute various malicious activities,
including:
Data Interception: Monitoring and capturing sensitive information such as
passwords, credit card numbers, and personal communications transmitted
over the network.
Malware Injection: Distributing malicious software to the connected
device, potentially leading to further compromise.
Phishing: Redirecting the user to fraudulent websites designed to steal
credentials or other personal information.
The effectiveness of a Karma attack stems from exploiting the default
behaviors of wireless devices, which prioritize convenience over security
by automatically seeking and connecting to known networks
—
Reply to this email directly, view it on GitHub
<#961>, or unsubscribe
<https://github.com/notifications/unsubscribe-auth/BLDL6BWTYMNBYACXDUVUGVD2VR7UZAVCNFSM6AAAAABZQ55KNOVHI2DSMVQWIX3LMV43ASLTON2WKOZSHEZTSNJTGI3TEMA>
.
You are receiving this because you are subscribed to this thread.Message
ID: ***@***.***>
[image: Gosheto1234]*Gosheto1234* created an issue (BruceDevices/firmware#961)
<#961>
*Is your feature request related to a problem? Please describe.*
No
*Describe the solution you'd like*
Can you add Karma attack in the future ?
*Describe alternatives you've considered*
*Additional context*
A Karma attack is a cybersecurity exploit targeting the automatic Wi-Fi
connection behaviors of client devices like smartphones, laptops, and
tablets. These devices often have a feature that remembers previously
connected Wi-Fi networks and attempts to reconnect to them automatically
for user convenience. This process involves the device broadcasting 'probe
requests' to detect known networks in the vicinity.
In a Karma attack, an attacker leverages this behavior by monitoring these
probe requests in public areas. The attacker then sets up a rogue Wi-Fi
access point mimicking the SSID (network name) from the device's probe
request. Believing this to be a trusted network, the device automatically
connects to the malicious access point without user intervention.
Once connected, the attacker can execute various malicious activities,
including:
Data Interception: Monitoring and capturing sensitive information such as
passwords, credit card numbers, and personal communications transmitted
over the network.
Malware Injection: Distributing malicious software to the connected
device, potentially leading to further compromise.
Phishing: Redirecting the user to fraudulent websites designed to steal
credentials or other personal information.
The effectiveness of a Karma attack stems from exploiting the default
behaviors of wireless devices, which prioritize convenience over security
by automatically seeking and connecting to known networks
—
Reply to this email directly, view it on GitHub
<#961>, or unsubscribe
<https://github.com/notifications/unsubscribe-auth/BLDL6BWTYMNBYACXDUVUGVD2VR7UZAVCNFSM6AAAAABZQ55KNOVHI2DSMVQWIX3LMV43ASLTON2WKOZSHEZTSNJTGI3TEMA>
.
You are receiving this because you are subscribed to this thread.Message
ID: ***@***.***>
--
Kind Regards
Christian R.
May Prosperity allways be with us!!
|
Beta Was this translation helpful? Give feedback.
0 replies
-
|
They don't respond to really good offers. |
Beta Was this translation helpful? Give feedback.
0 replies
-
its just and request/idea , its not that big of a deal |
Beta Was this translation helpful? Give feedback.
0 replies
-
|
may i add that karma attack would be incredibly hard to add. If you are really that into counter attacks get marauder it can find other esp32s and flippers |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Is your feature request related to a problem? Please describe.
No
Describe the solution you'd like
Can you add Karma attack in the future ?
Describe alternatives you've considered
Additional context
A Karma attack is a cybersecurity exploit targeting the automatic Wi-Fi connection behaviors of client devices like smartphones, laptops, and tablets. These devices often have a feature that remembers previously connected Wi-Fi networks and attempts to reconnect to them automatically for user convenience. This process involves the device broadcasting 'probe requests' to detect known networks in the vicinity.
In a Karma attack, an attacker leverages this behavior by monitoring these probe requests in public areas. The attacker then sets up a rogue Wi-Fi access point mimicking the SSID (network name) from the device's probe request. Believing this to be a trusted network, the device automatically connects to the malicious access point without user intervention.
Once connected, the attacker can execute various malicious activities, including:
Data Interception: Monitoring and capturing sensitive information such as passwords, credit card numbers, and personal communications transmitted over the network.
Malware Injection: Distributing malicious software to the connected device, potentially leading to further compromise.
Phishing: Redirecting the user to fraudulent websites designed to steal credentials or other personal information.
The effectiveness of a Karma attack stems from exploiting the default behaviors of wireless devices, which prioritize convenience over security by automatically seeking and connecting to known networks
Beta Was this translation helpful? Give feedback.
All reactions