In: Computer Science
One of the most successful attacks against wireless networks (WLAN) is the Evil Twin attack. The goal is to introduce an attacker-controlled wireless access point near the “known good” WLAN network. This access point will advertise the exact same SSID as the authorized WLAN. Wireless users may accidently connect to this malicious access point thinking it is part of their authorized network. Once the connection is established, the attacker can initiate a man-in-the-middle attack and capture or relay traffic while eavesdropping on the entire communication.
Explain the potential risk an Evil Twin attack like this this would present, not in theory, but to your own organization (company, school, etc.) and how you would go about setting up an Evil Twin attack if you were an attacker. Detail the goals, tools, process, and methodology. Use whatever research will assist you. Provide screenshots if possible to demonstrate what you are doing. They can be third party
Answer:
Evil Twin Attack Potential Risk:
The potential risk to our school’s network was clear:
Thank you.