I think the person you’re responding to is suggesting that the “honeypot” never routes you to the internet, it only routes you to some pages it has stored locally that tell you to not connect to random SSIDs.
That’s fun, informative, and harmless.
That said, the article only says this:
I’ll tune in the Raspberry Pi to the airplane’s network … and then I’ll have a little five-dollar Raspberry Pi Zero, I’ll have it put on a second Wi-Fi of its own and name the network ‘spanky’ with no password. Everyone on the plane can log in… eleven people connected. So I started using it as a honeypot.
He doesn’t say what it does, but making a transparent network that bridges to airplane WiFi and successfully does a MITM attack is a lot of work, but just spinning up a host that redirects everything to a local web server is easy.
I think the person you’re responding to is suggesting that the “honeypot” never routes you to the internet, it only routes you to some pages it has stored locally that tell you to not connect to random SSIDs.
That’s fun, informative, and harmless.
I know. That portion of their comment is fair enough. It’s the following statement that I took issue with.
You’re missing the point.
I think the person you’re responding to is suggesting that the “honeypot” never routes you to the internet, it only routes you to some pages it has stored locally that tell you to not connect to random SSIDs.
That’s fun, informative, and harmless.
That said, the article only says this:
He doesn’t say what it does, but making a transparent network that bridges to airplane WiFi and successfully does a MITM attack is a lot of work, but just spinning up a host that redirects everything to a local web server is easy.
I know. That portion of their comment is fair enough. It’s the following statement that I took issue with.
Ah, you were criticizing the poster here and not bandwagoning Carry on. 👍