[174913] in North American Network Operators' Group
Re: Marriott wifi blocking
daemon@ATHENA.MIT.EDU (Alistair Mackenzie)
Sat Oct 4 18:41:19 2014
X-Original-To: nanog@nanog.org
In-Reply-To: <FCD26398C5EDE746BFC47F43EA52A17305EEFC@dino.ad.hostasaurus.com>
Date: Fri, 3 Oct 2014 21:15:28 +0100
From: Alistair Mackenzie <magicsata@gmail.com>
To: David Hubbard <dhubbard@dino.hostasaurus.com>
Cc: NANOG <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org
You could monitor it with something like airodump-ng and send deauth
packets if its not associated with your own BSSID(s)
On 3 October 2014 21:06, David Hubbard <dhubbard@dino.hostasaurus.com>
wrote:
> Saw this article:
>
> http://www.cnn.com/2014/10/03/travel/marriott-fcc-wi-fi-fine/
>
> The interesting part:
>
> 'A federal investigation of the Gaylord Opryland Resort and
> Convention Center in Nashville found that Marriott employees
> had used "containment features of a Wi-Fi monitoring system"
> at the hotel to prevent people from accessing their own
> personal Wi-Fi networks.'
>
> I'm aware of how the illegal wifi blocking devices work, but
> any idea what legal hardware they were using to effectively
> keep their own wifi available but render everyone else's
> inaccessible?
>
> David
>