I have read an article where they described the following attack:
"If you look at your wireless card, it can operate in infrastructure mode, which is normal mode, but then there is also ad hoc mode, where you do peer-to-peer networking. Well, now [hackers] can change your card to ad hoc mode, where they are connected directly to your PC and can access all your information, including your access codes."
Is this in any way possible and if so how do you protect yourself against such an attack?
This makes no sense to me. I would question the source. If the hacker gained access to your computer and changed it to ad hoc over some back door wouldn't he/she get knocked off when the wireless link goes down? And then certainly you'll notice your connection going down and will have to go back in and change it to infrastructure mode to bring it back up. I would think this would send up "red flags" and everybody would be talking about the problem.
By using Infrastructure mode, you manage traffic and requir it to pass through an access point for authentication, right? Right.
By using Ad-hoc, a user can access files on your computer directly without going through an access point or getting authenticated.
Using Ad-hoc mode improperly is like extending your network outside a building and installing an ethernet port in the parking lot of your office and letting people plug in and get on and do what ever they are capable of doing. It's just not wise.
Transferring Crash file from standby: Login to the Active WLC in HA.
From CLI: (Cisco Controller) >transfer upload datatype crash (Cisco
Controller) >transfer upload filename (Cisco
Controller) >transfer upload mode tftp (Cisco Controller) >transfer
This is the start of a display filter cross reference between Wireshark
and OmniPeek. The 1st installment is a table of advanced filters. More
filters will be added as time allows. It is a living doc, so check back
for changes every so often Please feel f...