01-19-2023, 02:22 PM
Using BPF, as per your own recommendations, which i read somewhere in Github discussions:
1.
Based on above information obligatory use of BPF will reduce power of dump/lab tools.
Maybe better introduce kind of user agreement, that before using the tools user acknowledges that he understands all standards and … etc. After that, user will need to type “yes” to continue.
Obviously this will not completely prevent misusing the tools, but at least provide warning information of misusing the tools, which could lead to local laws violations. But the same time this will keep door open for seasoned researchers to use full power of tools.
1.
Quote:If you know the AP MAC and the CLIENT MAC you can use a BPF. But be warned, all additional information from CLIENTs running MAC RANDOMIZATION is filtered out:2.
Quote:Please notice:3.
Running your BPF will prevent that you see and capture undirected proberequests from CLIENTS using MAC randomization.
You will loose this information:
evilsocket/pwnagotchi#835 (comment)
Quote:I recommend to use the BPF as protection list to protect own APs, CLIENTs.https://github.com/ZerBea/hcxdumptool/is...-717196085
Based on above information obligatory use of BPF will reduce power of dump/lab tools.
Maybe better introduce kind of user agreement, that before using the tools user acknowledges that he understands all standards and … etc. After that, user will need to type “yes” to continue.
Obviously this will not completely prevent misusing the tools, but at least provide warning information of misusing the tools, which could lead to local laws violations. But the same time this will keep door open for seasoned researchers to use full power of tools.