Evil twin (wireless networks)

Evil twin (wireless networks)

Evil Twin is a term for a rogue Wi-Fi access point that appears to be a legitimate one offered on the premises, but actually has been set up by a hacker to eavesdrop on wireless communications among Internet surfers. ["Strange Wi-Fi spots may harbor hackers: ID thieves may lurk behind a hot spot with a friendly name." Andrew D. Smith. The Dallas Morning News. Knight Ridder Tribune Business News. Washington: May 9, 2007. pg. 1 Source type: Wire Feed ProQuest document ID: 1267536891 Text Word Count 766 Document URL: [http://proquest.umi.com/pqdweb?did=1267536891&sid=1&Fmt=3&clientId=76566&RQT=309&VName=PQD] (subscription). Retrieved June 6, 2007]

This type of Evil Twin Attack may be used by a hacker to steal the passwords of unsuspecting users by either snooping the communication link or by phishing, which involves setting up a fraudulent Web site and luring people there. ["Security Watch. Daniel Wolfe. American Banker. New York, N.Y.: Feb 14, 2007. Vol.172, Iss. 31; pg. 7. (A security firm used an Evil Twin as a test to obtain passwords from attendees at RSA security conference). Source type: Newspaper ISSN: 00027561 ProQuest document ID: 1219496681 Text Word Count 1097 Document URL: [http://proquest.umi.com/pqdweb?did=1219496681&sid=1&Fmt=3&clientId=76566&RQT=309&VName=PQD] (subscription). Retrieved June 6, 2007] A rogue Wi-Fi connection can be set up on a laptop with a bit of simple programming and wireless card that acts as an access point. The access points are hard to trace, since they can suddenly be shut off, and are easy to build. A hacker can make their own wireless networks that appear to be legitimate by simply giving their access point a similar name to the Wi-Fi network on the premises. Since the hacker may be physically closer to the victim than the real access point, their signal will be stronger, potentially drawing more victims. The hacker's computer can be configured to pass the person through to the legitimate access point while monitoring the traffic of the victim, or it can simply say the system is temporarily unavailable after obtaining a user id and password. ["Computer Column." Craig Crossman. Knight Ridder Tribune Business News. Washington: Aug 24, 2005. pg. 1. Source type: Wire Feed ProQuest document ID: 886418531 Text Word Count 761 Document URL: [http://proquest.umi.com/pqdweb?did=886418531&sid=1&Fmt=3&clientId=76566&RQT=309&VName=PQD] (Subscription). retrieved June 6, 2007] Several free programs available on the Internet can decode packets to reveal clear-text logins and passwords. Using an Evil Twin attack a hacker is able to harvest Web applications such as email that could send passwords in clear text.

One way that Corporate users can protect themselves from an Evil Twin attack is by using VPN (virtual private network) when logging into company servers. They should not send sensitive information such as bank account information or corporate user ids and passwords over a wireless network. [Attorney General Madigan warns computer users about 'Evil twin' attacks at wireless hotspots. US Fed News Service, Including US State News. Washington, D.C.: Jan 17, 2006. News release by Illinois Attorney General. Source type: Wire Feed ProQuest document ID: 975720601 Text Word Count 471 Document URL: [http://proquest.umi.com/pqdweb?did=975720601&sid=1&Fmt=3&clientId=76566&RQT=309&VName=PQD] (Subscription). retrieved June 6, 2007.]

Hackers typically setup Evil twin attacks near free hotspots, such as airports, cafes, hotels or libraries [Access Without Authentification: how and why we let anyone surf our wireless."Donna Watkins. Computers in Libraries. Westport: Mar 2006. Vol.26, Iss. 3; pg. 10, 5 pgs. Source type: Periodical ISSN: 10417915 ProQuest document ID: 1000365471 Text Word Count 2618 Document URL: [http://proquest.umi.com/pqdweb?did=1000365471&sid=1&Fmt=4&clientId=76566&RQT=309&VName=PQD] (subscription). retrieved June 6, 2007] .

References

* Jeremy Kirk, 'Evil twin' Hotspots Proliferate', IDG News Service, Apr 25, 2007

Related

* [http://fr3dc3rv.blogspot.com/2007/04/evil-twin.html FR3DC3RV Evil Twin Paper]
* [http://airsnarf.shmoo.com/ Airsnarf]


Wikimedia Foundation. 2010.

Игры ⚽ Поможем написать курсовую

Look at other dictionaries:

  • Evil twin (disambiguation) — Evil twin may refer to:* Evil twin, a literary device found in many soap operas and other television series * Evil twin (wireless networks), a method used to facilitate phishing * Evil Twin (film), a 2007 South Korean horror film * , a videogame… …   Wikipedia

  • Cracking of wireless networks — is the penetration of wireless networks. A wireless network can be penetrated in a number of ways. These ways vary greatly in the level of computer skill and commitment they require. Once within a network, a skilled hacker can modify software,… …   Wikipedia

  • Wireless intrusion prevention system — In computing, a wireless intrusion prevention system (WIPS) is a network device that monitors the radio spectrum for the presence of unauthorized access points (intrusion detection) , and can automatically take countermeasures (intrusion… …   Wikipedia

  • Hotspot (Wi-Fi) — A diagram showing a Wi Fi network A hotspot is a site that offers Internet access over a wireless local area network through the use of a router connected to a link to an Internet service provider. Hotspots typically use Wi Fi technology.… …   Wikipedia

  • Человек посередине — Атака «человек посередине», MITM атака (англ. Man in the middle)  термин в криптографии, обозначающий ситуацию, когда криптоаналитик (атакующий) способен читать и видоизменять по своей воле сообщения, которыми обмениваются… …   Википедия

  • Piggybacking (internet access) — Piggybacking is a term used to refer to access of a wireless internet connection by bringing one s own computer within the range of another s wireless connection, and using that service without the subscriber s explicit permission or knowledge.… …   Wikipedia

  • Milwaukee — This article is about the city in Wisconsin. For other uses, see Milwaukee (disambiguation). Milwaukee   City   Top: Milwaukee Skyline, Center Left …   Wikipedia

  • Mega Man Star Force — For the anime and manga series of the same name, see Mega Man Star Force (anime). Mega Man Star Force North American box art of the Leo version. Not pictured: Dragon and Pegasus versions Developer(s) Capcom …   Wikipedia

  • The Singularity Is Near — The Singularity Is Near: When Humans Transcend Biology   …   Wikipedia

  • performing arts — arts or skills that require public performance, as acting, singing, or dancing. [1945 50] * * * ▪ 2009 Introduction Music Classical.       The last vestiges of the Cold War seemed to thaw for a moment on Feb. 26, 2008, when the unfamiliar strains …   Universalium

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”