On Fri, Sep 26, 2014 at 4:56 PM, Doug Hughes <d...@will.to> wrote: > The dhcp issue is potentially exploitable, but much more difficult and > less risky in practice because that's an internal function and the > exploiter would have to bind his server to a privileged port meaning you > are already owned.
...or has the minimal wherewithal to run a rogue DHCP server on a random Windows box, which doesn't have the concept of privileged ports, or on a personal Linux laptop where they have root so the point is moot. How many places will allow random devices (think phones, iPads, etc.) to associate with access points? -- brandon s allbery kf8nh sine nomine associates allber...@gmail.com ballb...@sinenomine.net unix, openafs, kerberos, infrastructure, xmonad http://sinenomine.net
_______________________________________________ Tech mailing list Tech@lists.lopsa.org https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech This list provided by the League of Professional System Administrators http://lopsa.org/