Name WiFi MAC Address Tracking
Summary In this attack scenario, the attacker passively listens for WiFi messages and logs the associated Media Access Control (MAC) addresses. These addresses are intended to be unique to each wireless device (although they can be configured and changed by software). Once the attacker is able to associate a MAC address with a particular user or set of users (for example, when attending a public event), the attacker can then scan for that MAC address to track that user in the future.
Prerequisites None
Solutions Automatic randomization of WiFi MAC addresses Frequent changing of handset and retransmission device
Related Weaknesses
CWE ID Description
CWE-201 Exposure of Sensitive Information Through Sent Data
CWE-300 Channel Accessible by Non-Endpoint
Back to Top