Illegal wireless access point attack method and device
A technology of illegal access point and wireless access point, which is applied in the attack field of illegal access point of wireless WIFI, can solve the problem of defrauding customers' personal information, etc., and achieve the effect of preventing access.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0022] All features disclosed in this specification, or steps in all methods or processes disclosed, may be combined in any manner, except for mutually exclusive features and / or steps.
[0023] Any feature disclosed in this specification, unless specifically stated, can be replaced by other alternative features that are equivalent or have similar purposes. That is, unless expressly stated otherwise, each feature is one example only of a series of equivalent or similar features.
[0024] The illegal wireless access point attack method provided by the present invention is used after detecting a certain illegal access point, which specifically includes:
[0025] The wireless WIFI module alternately simulates the wireless WIFI client and the illegal access point to attack the illegal access point. When simulating a wireless WIFI client, the wireless WIFI module connects to the illegal access point to occupy the access port of the illegal access point to prevent new wireless WIFI ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 