▲ | Rygian 3 hours ago | |
> Volexity now determined the attacker was connecting to the network via wireless credentials they had brute-forced from an Internet-facing service. However, it was not clear where the attacker was physically that allowed them to connect to the Enterprise Wi-Fi to begin with. Further analysis of data available from Organization A’s wireless controller showed which specific wireless access points the attacker was connecting to and overlayed them on a map that had a layout of the building and specific floors. This is the kind of hackery I'd enjoy seeing in a blockbuster movie. | ||
▲ | 21 minutes ago | parent [-] | |
[deleted] |