Airsnitch
Looking at the new Airsnitch vulnerability, do you have any recommendations on hardening a Firewalla network to mitigate the threat?
-
AirSnitch is a set of techniques that allow a malicious device already connected to a Wi-Fi network to:
-
Bypass “client isolation” — a feature meant to stop clients from talking to each other on the same network.
-
Intercept and manipulate other clients’ network traffic — essentially acting as a **man-in-the-middle (MitM)**for both uplink and downlink traffic.
The key here is the device is already authenticated with the network... A "trusted device" can do a lot of things on the network. The best way to guard against these is simply segment or micro segmentation; either using different SSID/PPSK or VqLAN/VLAN.
-
-
The best solution is to use VqLAN (if you have AP7) or SSID -> VLAN mapping; these will protect and segment your network at layer 2 (VqLAN) and layer 2/3 (VLAN) These are better methods to make a guest network, and fully isolate from any type of layer 1 attack (such as those from Airsnitch)
Please sign in to leave a comment.
Comments
3 comments