Search results
Results from the Health.Zone Content Network
A captive portal is a web page accessed with a web browser that is displayed to newly connected users of a Wi-Fi or wired network before they are granted broader access to network resources. Captive portals are commonly used to present a landing or log-in page which may require authentication, payment, acceptance of an end-user license ...
Using captive portals. One of the most commonly used attacks under evil twins is a captive portal. At first, the attacker would create a fake wireless access point that has a similar Essid to the legitimate access point. The attacker then might execute a denial-of-service attack on the legitimate access point which will cause it to go offline ...
Network access control is a computer networking solution that uses a set of protocols to define and implement a policy that describes how to secure access to network nodes by devices when they initially attempt to access the network. [3] NAC might integrate the automatic remediation process (fixing non-compliant nodes before allowing access ...
Free (PC) or hardware version. UTM distribution with routing, firewall, anti-spam and anti-virus for web, FTP and e-mail, OpenVPN, IPsec, captive portal functionality, and captive portal (missing in community version). Endian Firewall Community (EFW) is a complete version for x86. The anti-virus for EFW is Sophos or ClamAV.
For authentication by smart-clients, Appendix D defines the Smart Client to Access Gateway Interface Protocol, which is an XML-based protocol for authentication. Smart-client software (and devices that use it) use this so-called WISPr XML to seamlessly login to HotSpots without the need for the user to interact with a captive portal.
A captive portal / login screen / splash page that users are redirected to for authentication and/or payment. The captive portal / splash page sometimes includes the social login buttons. A payment option using a credit card, iPass, PayPal, or another payment service (voucher-based Wi-Fi) A walled garden feature that allows free access to ...
DNS hijacking, DNS poisoning, or DNS redirection is the practice of subverting the resolution of Domain Name System (DNS) queries. This can be achieved by malware that overrides a computer's TCP/IP configuration to point at a rogue DNS server under the control of an attacker, or through modifying the behaviour of a trusted DNS server so that it does not comply with internet standards.
The WiFiDog authentication server is a PHP and PostgreSQL or MySQL server based solution written to authenticate clients in a captive portal environment. WiFiDog Auth provides portal specific content management, allows users to create wireless internet access accounts using email access, provides gateway uptime statistics and connection ...