Photo credit: Christiaan Colen – Flickr
On this technique, named Evil Twin, we take a different perspective to the attack. Using a powerful long range wireless card (Alfa AWUS036NH), we clone the target network to confuse our victim.
Then, we deauthenticate the victim from his own wireless network and wait until he connects to our access point – which looks exactly like his. When the victim connects, he is redirected to a service page asking for the WPA-2 key in order to access the internet.
As soon as we get the key, you can either allow the victim to use the network (maybe improvise some password sniffing?) or just bring it down manually.
For the write-up click here.
On this technique, named Evil Twin, we take a different perspective to the attack. Using a powerful long range wireless card (Alfa AWUS036NH), we clone the target network to confuse our victim.
Then, we deauthenticate the victim from his own wireless network and wait until he connects to our access point – which looks exactly like his. When the victim connects, he is redirected to a service page asking for the WPA-2 key in order to access the internet.
As soon as we get the key, you can either allow the victim to use the network (maybe improvise some password sniffing?) or just bring it down manually.
For the write-up click here.
Connect
Resources
What is the Evil Twin method?
Evil Twin is a term for a rogue Wi-Fi access point that appears to be a legitimate one offered on the premises, but actually has been set up to eavesdrop on wireless communications. An Evil Twin is the wireless version of the phishing scam. Read more
How to crack a Wi-Fi network's WPA password with Reaver
In the first section of this post, I’ll walk through the steps required to crack a WPA password using Reaver. After that, I’ll explain how Reaver works, and what you can do to protect your network against Reaver attacks. Read more
World of Warbiking
In 2014 Sophos surveyed Wi-Fi hotspots in London, San Francisco, Amsterdam, New York City, Las Vegas, San Diego, Sydney and Hanoi.Out of 81,743 networks surveyed in London, 29.5% WEP or no security encryption at all. 52% of networks were using WPA. 17% of Wi-Fi networks we scanned were using WPA2 encryption. Read more
Resources
What is the Evil Twin method?
Evil Twin is a term for a rogue Wi-Fi access point that appears to be a legitimate one offered on the premises, but actually has been set up to eavesdrop on wireless communications. An Evil Twin is the wireless version of the phishing scam. Read more
How to crack a Wi-Fi network's WPA password with Reaver
In the first section of this post, I’ll walk through the steps required to crack a WPA password using Reaver. After that, I’ll explain how Reaver works, and what you can do to protect your network against Reaver attacks. Read more
The Infernal-Twin is an automated tool designed for penetration testing activities, it has been developed to automate the Evil Twin Attack
“The tool was created to help the auditors and penetration testers to perform wireless security assessment in a quick manner and easing complex attack vectors.” states Khalilov M, the author. Read more
World of Warbiking
In 2014 Sophos surveyed Wi-Fi hotspots in London, San Francisco, Amsterdam, New York City, Las Vegas, San Diego, Sydney and Hanoi.
Out of 81,743 networks surveyed in London, 29.5% WEP or no security encryption at all. 52% of networks were using WPA. 17% of Wi-Fi networks we scanned were using WPA2 encryption. Read more
Articles
The dangers of using public Wi-Fi hotspots
Date: 28-03-2016
Source: betanews
Don't give open hotspots a security pass
Date: 08-01-2016
Source: Macworld
Wifiphisher - A new method for hacking WPA/WPA2 security
Date: 05-01-2015
Source: Latest Hacking News
Free tool automates phishing attacks for Wi-Fi passwords
Date: 05-01-2015
Source: Computerworld
Minimizing the threats of public Wi-Fi and avoiding evil twins
Date: 08-11-2014
Source: TechRepublic
Researchers outline how to crack WPA2 security
Date: 24-03-2014
Source: Securityweek
Wi-Fi's dirty secret of evil twins
Date: 12-06-2013
Source: Computerworld
White hat hackers steal data from London Wi-Fi users in “evil twin” attack
Date: 21-11-2013
Source: ITProPortal
The dangers of Evil Twin Wi-Fi hotspots
Date: 27-12-2012
Source: About.com
Presentations
Wireless Network Risks (What do I need to look for?)
Date: 11-11-2011
Source: Accuvant
Tutorials
Hack Wifi using Evil Twin Method with Linset in kali Linux
Date: 06-07-2016
Source: Hacking Articles
RWSPS: Fake WiFi Access Point – Walkthrough
Date: 11-12-2015
Source: rootsh3ll
Performing an Evil Twin Attack with a Router
Date: 05-02-2015
Source: Go Jhonny!
How to create an Evil Twin access point (with WPA/WPA2 capture)
Date: 11-10-2014
Source: [Hack]in[Sight]
Evil Twin tutorial
Date: 14-07-2014
Source: Kali Tutorials
How to hack Wi-Fi: Creating an Evil Twin wireless access point to eavesdrop on data
Date: 18-07-2013
Source: WonderHowTo
Evil Twin attack explanation
Date: 14-05-2009
Source: Eric Goldman
Whitepapers
The Evil Twin problem with WPA2-Enterprise
Date: 19-04-2014
Source: SUSE Linux Products GmbH
SANS: Phishing and Pharming - The Evil Twins
Date: 29-01-2007
Source: SANS