How To

Wireless Attacks

Three general wireless attacks are to use a fake access point (AP), or use a fake AP with a static extended service set ID (ESSID), or use a fake AP and an “evil twin.” All can be set up and executed instantly.

By setting up the fake AP, a hacker can obtain complete control over all TCP/IP connections passing through it. At that point, intercepting network traffic and capturing or changing it becomes useless. With a SSID that is known to the unsuspecting victim, the fake access point cannot be distinguished from the original access point.

To Top

Pin It on Pinterest

Share This