Hacker News new | past | comments | ask | show | jobs | submit login

No, it's "have access to any of their co-worker's computers". Or be a former coworker who still has the access key. Or even be a current coworker.



Seems a bit complicated:

1. Find some one to steal a key from but which I don't care about. 2. Locate a third person that I want to target and move close to them in non office hours. 3. Create a clone of their wifi and try to spoof some website. Hopefully I can be close enough to their device that it would join my clone instead of their other preferred networks.

At step 2 seems like a better idea to move close to the office and start probing around?


To get that close to the office would be very obvious. You'd have to loiter all day or set up a remote host with some power.

To get near a target in the wild isn't that hard, especially if you know where they like to go on a regular basis.

It's lot easier than a lot of other methods, especially for a high level target like a C-level exec who might have access to bank accounts with millions of dollars and like to work at a local coffee shop on weekends.


> You'd have to loiter all day or set up a remote host with some power

Or park a car outside


You usually can't park close enough to a corporate office to get on the wifi and not be noticed by corporate security.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: