Thweety Posted November 28, 2016 Share Posted November 28, 2016 Ok so help me out here. I just thought of this last night and I wonder how simple this truly is in real life. Darren has covered MITM before and even though this isn't necessarily the same, I think it follows closely with my thought process. So an example first. I have a laptop. I take it to the a hotel and connect to it's WIFI. The next day I go back to that hotel and my laptop sends out a beacon asking if the hotel WIFI is still there correct? Now on topic. So does a wireless printer do the same thing? Let's say I get someone's hand me down wireless printer. I turn it on, connect it to my WIFI and I'm good to go. But this printer used to be connected to the previous person's WIFI. So does that mean when I had initially turned it on it sent out beacons asking if the previous WIFI is still there? And if I used some awesome HAK5 tools could I say I am that WIFI router and thus gain the old WIFI's password? I may be using the words incorrectly here but wouldn't I be able to basically record and keep the encrypted password or hash and then when I'm actually in front of that person's WIFI could I do some sort of pass the hash technique to gain access? I mean if that's the case since people are throwing out printers all the time does that mean they are giving out their secret WIFI creds as well??? I just got and then ditched a bunch of WIFI printers and now I'm really wishing I didn't because I'd like to attempt this and see if this is really something to be concerned about. Let me know your thoughts and if there is any info on this out there I'd be interested. Simple google search only brought up a webserver flaw in HP printers. Quote Link to comment Share on other sites More sharing options...
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.