An independent researcher will release a Unix-based 802.11 “fingerprinting tool” that can be used to launch an attack via device drivers. An attacker can remotely tell not only how many people in a room have Intel and Broadcom chipsets in their laptops, but what versions of the device-driver software they are running. Device drivers usually aren’t secured and can run with the highest operating system privileges. Fingerprinting could help an enterprise ensure that users logging on to their WLAN are using corporate-issue laptops.”]
Source: https://www.darkreading.com/analytics/new-tool-dusts-for-fingerprints

