Unlock instant, AI-driven research and patent intelligence for your innovation.

Illegal wireless access point attack method and device

A technology of illegal access point and wireless access point, which is applied in the attack field of illegal access point of wireless WIFI, can solve the problem of defrauding customers' personal information, etc., and achieve the effect of preventing access.

Inactive Publication Date: 2016-11-16
DALIAN WANGYUE TECH DEV
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

And some illegal access points take advantage of this usage rule, and change their SSID to QTLS to make customers mistakenly think that the illegal access point is the hotel’s WIFI access point, thereby defrauding customers of personal information and even some very critical personal information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Illegal wireless access point attack method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] All features disclosed in this specification, or steps in all methods or processes disclosed, may be combined in any manner, except for mutually exclusive features and / or steps.

[0023] Any feature disclosed in this specification, unless specifically stated, can be replaced by other alternative features that are equivalent or have similar purposes. That is, unless expressly stated otherwise, each feature is one example only of a series of equivalent or similar features.

[0024] The illegal wireless access point attack method provided by the present invention is used after detecting a certain illegal access point, which specifically includes:

[0025] The wireless WIFI module alternately simulates the wireless WIFI client and the illegal access point to attack the illegal access point. When simulating a wireless WIFI client, the wireless WIFI module connects to the illegal access point to occupy the access port of the illegal access point to prevent new wireless WIFI ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an illegal wireless access point attack method and device, relates to the technical field of network security and aims at providing the method for attacking illegal access points, thereby enabling the illegal access points to be ineffective. The technical key point of the method and the device comprise the step that a wireless WIFI module alternately simulates wireless WIFI clients and the illegal access points after the illegal access points are detected, thereby attacking the illegal access points.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an attack method for illegal wireless WIFI access points. Background technique [0002] With the development of wireless network technology and the popularity of wireless network equipment, criminals can easily set up wireless access points using USB wireless network cards and other devices. The SSID (network name) of these wireless access points is the same as the SSID in normal use. And the transmission power is relatively high, so it is easy for a normally used wireless client to connect to the illegal wireless access point, resulting in the theft of user privacy data. [0003] For example, the SSID of a hotel's wireless WIFI access point is QTLS. When we need to use the hotel's WIFI, the hotel often requires customers to enter some personal information, but the hotel generally keeps these customers' personal information properly. And some illegal access points take ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/08H04W12/12H04W12/122
CPCH04W12/08H04W12/12
Inventor 郭西波
Owner DALIAN WANGYUE TECH DEV