Evil Twin Attack
An Evil Twin Attack is a dangerous technique where the attacker creates a fake Wi-Fi access point that mimics a legitimate one. The victim unknowingly connects to the attacker's network, allowing the attacker to launch various attacks such as Man-in-the-Middle (MITM) and DNS spoofing.
This attack is highly effective because it’s difficult to detect. The attacker clones the SSID (network name), MAC address, and settings of the original access point, making the fake one indistinguishable to the user.
Tools commonly used in Evil Twin Attacks:
- airbase-ng – Creates rogue access points.
- hostapd – Software access point daemon for Linux.
- Wifiphisher – Automated phishing attacks on Wi-Fi clients.
- Bettercap – MITM framework that can support Evil Twin setups.
Steps usually involved:
- Scan for target access points and capture details.
- Create a fake AP with identical SSID and settings.
- Use Deauthentication to force clients to disconnect from the original AP.
- Clients automatically reconnect to the Evil Twin.
- Launch further attacks (e.g., sniffing credentials, redirection to fake portals).
Dangers of Evil Twin Attacks:
- Credential harvesting via fake login pages.
- Data sniffing (MITM).
- Installation of malware through spoofed updates.
How to protect against Evil Twin Attacks:
- Always verify Wi-Fi networks before connecting.
- Use VPNs to encrypt your traffic even on public Wi-Fi.
- Disable auto-connect to open networks.
- Use HTTPS Everywhere or browser plugins to enforce encryption.
- Use WPA3 and strong password-protected Wi-Fi whenever possible.
Summary:
Evil Twin Attacks are stealthy and powerful. Understanding how they work and the tools involved is essential for both attackers and defenders. Awareness and good network hygiene can greatly reduce the risk.