mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-11-28 18:28:23 -05:00
FragAttacks: Fragmentation & Aggregation Attacks
944814106e
As a compromise between usability and security, do not disable AP PIN permanently based on failed PIN validations. Instead, go to AP Setup Locked state for increasing amount of time between each failure to slow down brute force attacks against the AP PIN. This avoids problems with some external Registrars that may try to use the same PIN multiple times without user input. Now, the user will still be able to fix the PIN and try again later while a real attack is delayed enough to make it impractical. |
||
---|---|---|
doc | ||
eap_example | ||
hostapd | ||
mac80211_hwsim | ||
patches | ||
radius_example | ||
src | ||
testing | ||
tests | ||
wpa_supplicant | ||
www | ||
.gitignore | ||
build_nsis.sh | ||
build_release | ||
COPYING | ||
FAQ | ||
README |
wpa_supplicant and hostapd v0.6.x --------------------------------- Copyright (c) 2002-2007, Jouni Malinen <j@w1.fi> and contributors All Rights Reserved. These program is dual-licensed under both the GPL version 2 and BSD license. Either license may be used at your option. This package may include either wpa_supplicant, hostapd, or both. See README file respective subdirectories (wpa_supplicant/README or hostapd/README) for more details. Source code files have been moved around in v0.6.x releases and compared to earlier releases, the programs are now build by first going to a subdirectory (wpa_supplicant or hostapd) and creating build configuration (.config) and running 'make' there (for Linux/BSD/cygwin builds).