Question

In: Computer Science

One of the most successful attacks against wireless networks (WLAN) is the Evil Twin attack. The...

One of the most successful attacks against wireless networks (WLAN) is the Evil Twin attack. The goal is to introduce an attacker-controlled wireless access point near the “known good” WLAN network. This access point will advertise the exact same SSID as the authorized WLAN. Wireless users may accidently connect to this malicious access point thinking it is part of their authorized network. Once the connection is established, the attacker can initiate a man-in-the-middle attack and capture or relay traffic while eavesdropping on the entire communication.

Explain the potential risk an Evil Twin attack like this this would present, not in theory, but to your own organization (company, school, etc.) and how you would go about setting up an Evil Twin attack if you were an attacker. Detail the goals, tools, process, and methodology. Use whatever research will assist you. Provide screenshots if possible to demonstrate what you are doing. They can be third party

Solutions

Expert Solution

Answer:

Evil Twin Attack Potential Risk:

  • The Evil Twin attack itself is quiet simple, both in implementation and idea.
  • The basic idea behind this type of attack is to plant an illegitimate Wireless Router with the exact same SSID as the legitimate router into the same physical network, idea beingthat people typically do not check to make sure they are connecting to the right one and would assume that duplicate network IDs are just a glitch.
  • To demonstrate how easy this attack would be I will use the University of North Texas, my undergraduate Alma Mater, as an example.
  • I do have to say that this example was actually used and that we did not use any data collected but instead were just trying to see if we could do this attack.

The potential risk to our school’s network was clear:

  • The potential risk to our school’s network was clear: we could intercept traffic from students, specifically in the college of business, who were accessing personal or financial data and in fact we did see 2 students accessing the fidelity trading system during this attack, though the traffic was using https.
  • To begin our attack, we used a raspberry pi with a skinned down version of Kali Linux to avoid detection when we left it attached to power behind a printer in the student center.
  • We used a serial cable and connected straight in to the device to start aircrack, as seen below.
  • Once we were in observation mode we saw a few students connect to the network and selected a couple at random.
  • We noticed the mac address of 00:09:5B:6F:64:1E was the mac of the actual access point and the AP’s name was EagleConnect.
  • We created the fake access point using the command airbase-ng-a00:09:5B:6F:64:1E --essid "EagleConnect" -c11 mon0 based on instructions from a presentation our instructorfor “IntroductiontoInformationSecurity” had walked us through the prior semester and then, using the same source, sentade-authentication packet to both our targets.
  • As expected, our 2 targets were sitting a few tables over and immediately tried connecting too ur fake network, which was in turn connected to the actual network for internet access.
  • At this point we understood that we had succeeded in reproducing the Evil Twin attack but we did not proceed further. If we had gone further with this attack we could have very easily used Ethercap to inject malicious traffic and could have compromised the systems for future use. We could have also recovered usernames, passwords, and personally identifiable information from the traffic as well.

Thank you.


Related Solutions

A successful attack to the Internet DNS would be devastating. Explain what type of attacks can...
A successful attack to the Internet DNS would be devastating. Explain what type of attacks can be made towards DNS. Why, to-date, such attacks in practice have not been successful? In your answer, you should consider caching in particular. Why such technique has not only proven to provide better performance, which is its original goal, but also protection against security attacks.
The followings are the most common security threats in networks. a. DoS Attack [5 marks] b....
The followings are the most common security threats in networks. a. DoS Attack [5 marks] b. Sniffer [5 marks] c. Spoofing [5 marks] d. Man-in-middle attack [5 marks] e. TCP/IP Hijacking [5 marks] You are expected to carry out an analysis and discuss on the nature of each threats by addressing the following elements; What it is all about? How can such attack/threats take place in the network? Why they do it? When normally such attack take place (i.e. any...
Which cyber security measure would have been most likely to have prevented the 2016 successful attack...
Which cyber security measure would have been most likely to have prevented the 2016 successful attack on the Democratic National Committee (DNC): A. Stronger passwords used by DNC employees B. 2-factor authentication that uses a password and a security question for the user C. Hardware 2-factor authentication D. 2-factor authentication that uses a password and a text to the user's phone E. Software 2-factor authentication
Research real-world attacks that have been made against TCP and report on one of them. (i)...
Research real-world attacks that have been made against TCP and report on one of them. (i) How was the attack accomplished? (ii) How was the target able to mitigate or stop the attack? (iii) Who was the attacker (v) what was their apparent motivation?
Man-in-the-middle is one of the most popular types of attack. It can be used to sniff...
Man-in-the-middle is one of the most popular types of attack. It can be used to sniff victims credentials to penetrate their system. Research the following attacks to find methods to prevent this from happening: MAC spoofing DNS poisoning DNS spoofing ICMP redirect
1.Nortel Networks experienced one of the most notorious Canadian bankruptcies. Eventually there was a distribution of...
1.Nortel Networks experienced one of the most notorious Canadian bankruptcies. Eventually there was a distribution of funds obtained from selling off Nortel’s assets, including intellectual property. Former Nortel employees eligible to receive pensions made up one of the major groups seeking relief from the court. Would those entitled to pension funds have been secured or unsecured creditors in the bankruptcy? 2.Dedrisan Inc. has experienced an unusually large loss from which it is very unlikely to recover. It is in default...
Amazon is one of the most successful on line retailer in the world... What would happen...
Amazon is one of the most successful on line retailer in the world... What would happen after Bezos leaves? Give reasonable answer
De Beers, a diamond mining and distribution firm, is one of the most successful monopolies in...
De Beers, a diamond mining and distribution firm, is one of the most successful monopolies in history. The firm used numerous tactics to successfully control supply and demand. Read the article 'Here's why diamonds are so expensive' (Links to an external site.), and watch the video 'Why engagement rings are a scam' (Links to an external site.) [warning: contains strong language], and respond to the following prompts in a post with a minimum of 250 words. Feel free to bring...
Write a one paragraph summary of the Black-Scholes formula and argue for or against “the most...
Write a one paragraph summary of the Black-Scholes formula and argue for or against “the most important equation in finance”. Here is a documentary to give you some more background info: Http://documentary-movie.com/trillion-dollar-bet/
10. What kind of plant-pollinator networks would have the most ecosystem stability? a. One with many...
10. What kind of plant-pollinator networks would have the most ecosystem stability? a. One with many weak connections between plants and pollinators b. One with overalpping generations c. One with a few strong connections d. One that has a few plants and pollinating insects e. One with a few common pollinators going to one plant
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT