Security Fail of the Week



Found in a Parisian sushi restaurant and presented without comment.

(Upload too big. =[ )


I guess this is an open wifi for clients, and this is actually pretty security conscious. They probably enabled AP client isolation, so you can’t easily sniff for sensitive data.


Well, I was able to do simple recon and login to the router from my phone. So really all it did was serve as a welcome mat…

(Co-Founder and Part-time Fool ) #4

So it seems my exploits have been found in more WPA2 implimentations?

(oaktree) #5

You saw it coming. You’re ahead of the game.