[174847] in North American Network Operators' Group
Re: Marriott wifi blocking
daemon@ATHENA.MIT.EDU (Michael O Holstein)
Fri Oct 3 16:32:30 2014
X-Original-To: nanog@nanog.org
From: Michael O Holstein <michael.holstein@csuohio.edu>
To: David Hubbard <dhubbard@dino.hostasaurus.com>, NANOG <nanog@nanog.org>
Date: Fri, 3 Oct 2014 20:18:02 +0000
In-Reply-To: <1412367368703.67558@csuohio.edu>
Errors-To: nanog-bounces@nanog.org
>but how it works is by sending DEAUTH packets with spoofed MAC addresses=
=0A=
>"rouge AP" response on Cisco/Aruba works like this.=0A=
=0A=
DIY version if you want to try it out .. just download Kali/Backtrack or co=
mpile aircrack-ng=0A=
=0A=
http://www.aircrack-ng.org/doku.php?id=3Ddeauthentication=0A=
=0A=
Regards,=0A=
=0A=
Michael Holstein=0A=
Cleveland State University=0A=
________________________________________=0A=
From: NANOG <nanog-bounces@nanog.org> on behalf of David Hubbard <dhubbard@=
dino.hostasaurus.com>=0A=
Sent: Friday, October 03, 2014 4:06 PM=0A=
To: NANOG=0A=
Subject: Marriott wifi blocking=0A=
=0A=
Saw this article:=0A=
=0A=
http://www.cnn.com/2014/10/03/travel/marriott-fcc-wi-fi-fine/=0A=
=0A=
The interesting part:=0A=
=0A=
'A federal investigation of the Gaylord Opryland Resort and=0A=
Convention Center in Nashville found that Marriott employees=0A=
had used "containment features of a Wi-Fi monitoring system"=0A=
at the hotel to prevent people from accessing their own=0A=
personal Wi-Fi networks.'=0A=
=0A=
I'm aware of how the illegal wifi blocking devices work, but=0A=
any idea what legal hardware they were using to effectively=0A=
keep their own wifi available but render everyone else's=0A=
inaccessible?=0A=
=0A=
David=