Ps - "I tested and deny inter user traffic stops this, but it also stops all traffic :) " So the big question is if this is normal behaviour and i should just check somewhere the the snmp traps generated by "poison-check-enable" or there is another way to do this or a bug ? The problem is that i have done some tests (using arpspoof in kali linux) and although i cant spoof a connected client in a SSID i can spoof the Default-gateway to the other clients.Įxample: (clients on same SSID, Default GW a router)Ĭlient X cant "tell" client Y or the gateway via arp spoof that client z ip is at his mac.īUT Client X can tell client Y and Z that the ip of the gateway is at his mac, so he can receive packets from client Y,Z (half mitd ?) I have enabled in my test IAP the following:įrom what i have read this should stop arp poisoning in a SSID. Regarding this topic i have some questions that i hope some guru can help me.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |