top | item 47170489 (no title) russdill | 3 days ago It looks like both clients must be on the same VLAN for the attack to work. They could be connected on different BSSIDs or even different SSIDs, but they still must be on the same VLAN. discuss order hn newest cluckindan|3 days ago If the vulnerability is between layers 1 and 2, wouldn’t that imply that VLAN tagging at layer 2 might not be effective in segregating the traffic? cyberax|3 days ago Wireless cards typically don't expose the VLAN tags directly. So VLANs should be OK.
cluckindan|3 days ago If the vulnerability is between layers 1 and 2, wouldn’t that imply that VLAN tagging at layer 2 might not be effective in segregating the traffic? cyberax|3 days ago Wireless cards typically don't expose the VLAN tags directly. So VLANs should be OK.
cyberax|3 days ago Wireless cards typically don't expose the VLAN tags directly. So VLANs should be OK.
cluckindan|3 days ago
cyberax|3 days ago