inject bogus HTTP response in HUB environment
- From: whistlingdixie <whistlingdixie@xxxxxxxxxxxxxx>
- Date: Thu, 26 Feb 2009 06:18:59 -0800 (PST)
I am testing an open WLAN that utilizes application layer authentication
after association. The user associates and gets an IP address, but to
"access" the network the user must open a browser and go to any HTTP
website, which results in an HTTP redirect to HTTPS://<IPADDRESS>, where
IPADDRESS is a some component of the wireless infrastructure. This server
returns an HTML form for authentication. I want to influence that very
first redirect. Long story short...is there a tool that will work in a HUB
environment (i.e. no ARP tricks) to inject a bogus HTTP response? I want to
redirect to my test machine and present my own form.
View this message in context: http://www.nabble.com/inject-bogus-HTTP-response-in-HUB-environment-tp22225072p22225072.html
Sent from the Penetration Testing mailing list archive at Nabble.com.