Forum

  • By (Deleted User)

    moe, on that article I posted it stated this:

    The third method is for deauthentication and disassociation frames. By using a pair of related one-time keys, one secret in an access point and one for a client, the client can determine if the deauthentication is valid. This method can present problems for users who deploy or are considering intrusion-prevention systems in their networks.


    The details of how the WIPS/WIDS system is supposed to work for preventing rogues or unauthorized with this statement is dead in the water if the above is true? Are they using WEP for the one-time keys.

    We are using BlueSocket RF sensors, I will read up further on the WIDS- WIPS and try to understand what is happening more.

    Thanks for the response to the post.

Page 1 of 1
  • 1