{"id":689,"date":"2023-01-17T20:24:06","date_gmt":"2023-01-17T20:24:06","guid":{"rendered":"http:\/\/localhost\/wordpress\/?p=689"},"modified":"2023-01-17T20:24:06","modified_gmt":"2023-01-17T20:24:06","slug":"executing-the-evil-twin-wireless-attack","status":"publish","type":"post","link":"http:\/\/localhost\/wordpress\/2023\/01\/17\/executing-the-evil-twin-wireless-attack\/","title":{"rendered":"Executing the Evil Twin Wireless Attack"},"content":{"rendered":"\n
<\/span>
<\/div>
\n

<\/p>\n<\/div><\/div>\n\n\n\n


\n\n\n\n

The following document is one of the case studies we carried out in the 1st<\/sup> semester at the Advanced Cybersecurity MSc. (Polytechnic University of Bucharest). It describes how a rogue wireless access point (a.k.a. the “Evil Twin”) can be created to mimic a legitimate one, in order to trick users to connect to it.

The paper also contains a working proof-of-concept (PoC<\/a>) that presents the main steps that I personally took while executing this attack (along with the needed hardware & software). This is something you should try only<\/em> at home<\/strong>, on your own equipment<\/strong> \ud83d\ude05.

The goal was to gracefully steal precious<\/em> WiFi passwords<\/mark> with an Evil Twin and a little bit of
Social Engineering<\/a>, instead of applying brute-force to guess them (which sometimes takes a little bit too much time<\/a> \ud83d\udc80).<\/p>\n\n\n\n