Dino Dai Zovi and Shane Macaulay, two security researchers, wrote a set of wireless security tools developed as a PoC of a vulnerability and called it Karma. It was later integrated with Metasploit and called Karmetasploit, which allows us to create fake access points, capture passwords and dates, and conduct browser attacks against clients.
In the process of connecting to a wireless network, most of the operating systems often keep the previous network's connections with them as the preferred networks list and send continuous probes in search of these networks. Once the network is found, the system automatically connects to the network.
Because of sending continuous probes, any adversary within this range can listen passively and see the networks...