Question

In: Computer Science

One of the most successful attacks against wireless networks (WLAN) is the Evil Twin attack. The...

One of the most successful attacks against wireless networks (WLAN) is the Evil Twin attack. The goal is to introduce an attacker-controlled wireless access point near the “known good” WLAN network. This access point will advertise the exact same SSID as the authorized WLAN. Wireless users may accidently connect to this malicious access point thinking it is part of their authorized network. Once the connection is established, the attacker can initiate a man-in-the-middle attack and capture or relay traffic while eavesdropping on the entire communication.

Explain the potential risk an Evil Twin attack like this this would present, not in theory, but to your own organization (company, school, etc.) and how you would go about setting up an Evil Twin attack if you were an attacker. Detail the goals, tools, process, and methodology. Use whatever research will assist you. Provide screenshots if possible to demonstrate what you are doing. They can be third party

Solutions

Expert Solution

Answer:

Evil Twin Attack Potential Risk:

  • The Evil Twin attack itself is quiet simple, both in implementation and idea.
  • The basic idea behind this type of attack is to plant an illegitimate Wireless Router with the exact same SSID as the legitimate router into the same physical network, idea beingthat people typically do not check to make sure they are connecting to the right one and would assume that duplicate network IDs are just a glitch.
  • To demonstrate how easy this attack would be I will use the University of North Texas, my undergraduate Alma Mater, as an example.
  • I do have to say that this example was actually used and that we did not use any data collected but instead were just trying to see if we could do this attack.

The potential risk to our school’s network was clear:

  • The potential risk to our school’s network was clear: we could intercept traffic from students, specifically in the college of business, who were accessing personal or financial data and in fact we did see 2 students accessing the fidelity trading system during this attack, though the traffic was using https.
  • To begin our attack, we used a raspberry pi with a skinned down version of Kali Linux to avoid detection when we left it attached to power behind a printer in the student center.
  • We used a serial cable and connected straight in to the device to start aircrack, as seen below.
  • Once we were in observation mode we saw a few students connect to the network and selected a couple at random.
  • We noticed the mac address of 00:09:5B:6F:64:1E was the mac of the actual access point and the AP’s name was EagleConnect.
  • We created the fake access point using the command airbase-ng-a00:09:5B:6F:64:1E --essid "EagleConnect" -c11 mon0 based on instructions from a presentation our instructorfor “IntroductiontoInformationSecurity” had walked us through the prior semester and then, using the same source, sentade-authentication packet to both our targets.
  • As expected, our 2 targets were sitting a few tables over and immediately tried connecting too ur fake network, which was in turn connected to the actual network for internet access.
  • At this point we understood that we had succeeded in reproducing the Evil Twin attack but we did not proceed further. If we had gone further with this attack we could have very easily used Ethercap to inject malicious traffic and could have compromised the systems for future use. We could have also recovered usernames, passwords, and personally identifiable information from the traffic as well.

Thank you.


Related Solutions

A successful attack to the Internet DNS would be devastating. Explain what type of attacks can...
A successful attack to the Internet DNS would be devastating. Explain what type of attacks can be made towards DNS. Why, to-date, such attacks in practice have not been successful? In your answer, you should consider caching in particular. Why such technique has not only proven to provide better performance, which is its original goal, but also protection against security attacks.
The followings are the most common security threats in networks. a. DoS Attack [5 marks] b....
The followings are the most common security threats in networks. a. DoS Attack [5 marks] b. Sniffer [5 marks] c. Spoofing [5 marks] d. Man-in-middle attack [5 marks] e. TCP/IP Hijacking [5 marks] You are expected to carry out an analysis and discuss on the nature of each threats by addressing the following elements; What it is all about? How can such attack/threats take place in the network? Why they do it? When normally such attack take place (i.e. any...
Man-in-the-middle is one of the most popular types of attack. It can be used to sniff...
Man-in-the-middle is one of the most popular types of attack. It can be used to sniff victims credentials to penetrate their system. Research the following attacks to find methods to prevent this from happening: MAC spoofing DNS poisoning DNS spoofing ICMP redirect
1.Nortel Networks experienced one of the most notorious Canadian bankruptcies. Eventually there was a distribution of...
1.Nortel Networks experienced one of the most notorious Canadian bankruptcies. Eventually there was a distribution of funds obtained from selling off Nortel’s assets, including intellectual property. Former Nortel employees eligible to receive pensions made up one of the major groups seeking relief from the court. Would those entitled to pension funds have been secured or unsecured creditors in the bankruptcy? 2.Dedrisan Inc. has experienced an unusually large loss from which it is very unlikely to recover. It is in default...
Amazon is one of the most successful on line retailer in the world... What would happen...
Amazon is one of the most successful on line retailer in the world... What would happen after Bezos leaves? Give reasonable answer
10. What kind of plant-pollinator networks would have the most ecosystem stability? a. One with many...
10. What kind of plant-pollinator networks would have the most ecosystem stability? a. One with many weak connections between plants and pollinators b. One with overalpping generations c. One with a few strong connections d. One that has a few plants and pollinating insects e. One with a few common pollinators going to one plant
Write a one paragraph summary of the Black-Scholes formula and argue for or against “the most...
Write a one paragraph summary of the Black-Scholes formula and argue for or against “the most important equation in finance”. Here is a documentary to give you some more background info: Http://documentary-movie.com/trillion-dollar-bet/
One of the most successful firm In U.S. retailing during the last decade is Walmart. 1....
One of the most successful firm In U.S. retailing during the last decade is Walmart. 1. Has Wal-Mart's success fulfilled the virtues/characterization of competition often discussed(e.g.. posts of firms, low prices, low entry barriers, etc.) 2. Has there been an economic/social cost of Wal-Mart's success? 3. List the problems allegedly caused by Wal-Mart for it's employees, local communities, consumers, and the environment. 4. Discuss the most serious charge against Wal-Mart. 5. Discuss the most significant benefit Wal-Mart offers.
One of the most successful discount department stores in America is known as Wal-Mart stores and...
One of the most successful discount department stores in America is known as Wal-Mart stores and is named after its founder Sam Walton. Because of the phenomenal success of these stores, Sam Walton became one of the richest men in America. Also, because of his leadership, the stores have enjoyed continuous growth and expansion, so that by mid 1980s, the chain had over 700 stores and was increasing at the rate of an additional 100 stores per year. Its sales...
Assignment specification — Case Study :IKEA Operations Management IKEA is the one of the most successful...
Assignment specification — Case Study :IKEA Operations Management IKEA is the one of the most successful furniture retailer globally. With 276 stores in 36 countries, they have managed to develop their own special way of selling furniture. Their stores’ layout means customers often spend two hours in the store – far longer than in rival furniture retailers. IKEA’s philosophy goes back to the original business, started in the 1950s in Sweden by Ingvar Kamprad. He built a showroom on the...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT