HACKING WPA2: EVIL TWIN METHOD

The wireless version of the phishing scam

On this technique, named Evil Twin, we take a different perspective to the attack. Using a powerful long range wireless card (Alfa AWUS036NH), we clone the target network to confuse our victim.

Then, we deauthenticate the victim from his own wireless network and wait until he connects to our access point – which looks exactly like his. When the victim connects, he is redirected to a service page asking for the WPA-2 key in order to access the internet.

As soon as we get the key, you can either allow the victim to use the network (maybe improvise some password sniffing?) or just bring it down manually.

For the write-up click here.

On this technique, named Evil Twin, we take a different perspective to the attack. Using a powerful long range wireless card (Alfa AWUS036NH), we clone the target network to confuse our victim.

Then, we deauthenticate the victim from his own wireless network and wait until he connects to our access point – which looks exactly like his. When the victim connects, he is redirected to a service page asking for the WPA-2 key in order to access the internet.

As soon as we get the key, you can either allow the victim to use the network (maybe improvise some password sniffing?) or just bring it down manually.

For the write-up click here.

Wireless

Wireless

cyber security_black

Hacking

Source

About the speaker

Computer, Design, Network & Security

Source: Twitter

Connect

<div style="width:120px;height:1px;background-color:#f2f2f2;margin:0px auto;"></div>

About the speaker

Computer, Design, Network & Security

Source: Twitter

Resources

<center><blockquote class="twitter-tweet" data-lang="en"><p lang="en" dir="ltr">Many AP killers out in the wild, commonly used in Evil Twin attacks against your wifi network. <a href="http://t.co/rULtMaHiDm">pic.twitter.com/rULtMaHiDm</a></p>— databackup (@databackup) <a href="https://twitter.com/databackup/status/399678096204263424">November 10, 2013</a></blockquote> <script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script></center>

What is the Evil Twin method?

Evil Twin is a term for a rogue Wi-Fi access point that appears to be a legitimate one offered on the premises, but actually has been set up to eavesdrop on wireless communications. An Evil Twin is the wireless version of the phishing scam. Read more

How to crack a Wi-Fi network's WPA password with Reaver

In the first section of this post, I’ll walk through the steps required to crack a WPA password using Reaver. After that, I’ll explain how Reaver works, and what you can do to protect your network against Reaver attacks. Read more

World of Warbiking

In 2014 Sophos surveyed Wi-Fi hotspots in LondonSan FranciscoAmsterdamNew York CityLas Vegas, San Diego, Sydney and Hanoi.Out of 81,743 networks surveyed in London, 29.5% WEP or no security encryption at all. 52% of networks were using WPA. 17% of Wi-Fi networks we scanned were using WPA2 encryption. Read more

Resources

<center><blockquote class="twitter-tweet" data-lang="en"><p lang="en" dir="ltr">Many AP killers out in the wild, commonly used in Evil Twin attacks against your wifi network. <a href="http://t.co/rULtMaHiDm">pic.twitter.com/rULtMaHiDm</a></p>— databackup (@databackup) <a href="https://twitter.com/databackup/status/399678096204263424">November 10, 2013</a></blockquote> <script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script></center>

What is the Evil Twin method?

Evil Twin is a term for a rogue Wi-Fi access point that appears to be a legitimate one offered on the premises, but actually has been set up to eavesdrop on wireless communications. An Evil Twin is the wireless version of the phishing scam. Read more

How to crack a Wi-Fi network's WPA password with Reaver

In the first section of this post, I’ll walk through the steps required to crack a WPA password using Reaver. After that, I’ll explain how Reaver works, and what you can do to protect your network against Reaver attacks. Read more

The Infernal-Twin is an automated tool designed for penetration testing activities, it has been developed to automate the Evil Twin Attack

“The tool was created to help the auditors and penetration testers to perform wireless security assessment in a quick manner and easing complex attack vectors.” states Khalilov M, the author. Read more

World of Warbiking

In 2014 Sophos surveyed Wi-Fi hotspots in LondonSan FranciscoAmsterdamNew York CityLas Vegas, San Diego, Sydney and Hanoi.

Out of 81,743 networks surveyed in London, 29.5% WEP or no security encryption at all. 52% of networks were using WPA. 17% of Wi-Fi networks we scanned were using WPA2 encryption. Read more

Articles

<div style="width:250px;height:1px;background-color:#ffffff;margin:0px auto;"></div>

Presentations

<div style="width:250px;height:1px;background-color:#ffffff;margin:0px auto;"></div>

Tutorials

<div style="width:250px;height:1px;background-color:#ffffff;margin:0px auto;"></div>

Whitepapers

<div style="width:250px;height:1px;background-color:#ffffff;margin:0px auto;"></div>