Threats & AttacksHigh
Evil Twin
A wireless network attack where an attacker creates a fake Wi-Fi access point that mimics a legitimate network to intercept user traffic and steal sensitive information
Skill Paths:
Wireless SecurityNetwork SecurityPenetration TestingSecurity Analysis
Job Paths:
Wireless Security SpecialistNetwork Security EngineerPenetration TesterSecurity Analyst
Relevant Certifications:
CEHOSCPCISSPCompTIA Security+
Content
What is an Evil Twin Attack?
An Evil Twin is a wireless network attack where an attacker creates a fake Wi-Fi access point that appears to be a legitimate network. The fake access point typically has a stronger signal than the legitimate one, causing users to connect to it instead, allowing the attacker to intercept and monitor all network traffic.
How Evil Twin Attacks Work
Attack Setup
- Network reconnaissance – Identify target networks and their characteristics
- Fake AP creation – Set up malicious access point with same SSID
- Signal amplification – Use stronger signal to attract users
- Traffic interception – Monitor and capture all network traffic
- Data extraction – Extract sensitive information from captured traffic
Common Techniques
- SSID spoofing – Use identical network name
- Signal jamming – Disrupt legitimate network signal
- Deauthentication attacks – Force users to disconnect and reconnect
- Captive portal – Create fake login page
- SSL stripping – Remove encryption from HTTPS traffic
Types of Evil Twin Attacks
Passive Monitoring
- Traffic analysis – Monitor network traffic without modification
- Packet capture – Capture and analyze data packets
- Session hijacking – Steal active sessions
- Credential harvesting – Collect login credentials
Active Interference
- Traffic modification – Alter network traffic
- DNS poisoning – Redirect DNS queries
- ARP spoofing – Manipulate ARP tables
- SSL certificate spoofing – Present fake certificates
Advanced Techniques
- KARMA attacks – Respond to probe requests
- MANA attacks – Manipulate network announcements
- Known beacon attacks – Exploit saved network preferences
- Wi-Fi Pineapple – Use specialized hardware for attacks
Detection and Prevention
Technical Controls
- VPN usage – Encrypt all traffic through VPN
- Certificate validation – Verify SSL certificates
- Network monitoring – Monitor for duplicate SSIDs
- Signal strength analysis – Detect unusual signal patterns
- MAC address filtering – Restrict access to known devices
User Education
- Security awareness – Educate users about risks
- Connection verification – Verify network authenticity
- Avoid public Wi-Fi – Use mobile hotspots when possible
- Disable auto-connect – Prevent automatic connections
- Network preferences – Remove saved public networks
Organizational Measures
- Wireless security policies – Clear guidelines for wireless usage
- Network monitoring – Monitor for rogue access points
- Incident response – Prepare for evil twin incidents
- Regular audits – Review wireless security measures
Response and Recovery
Immediate Actions
- Disconnect immediately – Remove device from network
- Change passwords – Update all account credentials
- Monitor accounts – Watch for unauthorized activity
- Report incident – Notify security teams
Investigation Steps
- Network analysis – Examine network traffic logs
- Device forensics – Analyze affected devices
- Impact assessment – Determine scope of compromise
- Corrective actions – Implement improved security measures
Best Practices
- Use VPN connections – Encrypt all wireless traffic
- Verify network authenticity – Confirm legitimate networks
- Avoid sensitive transactions – Don't use public Wi-Fi for banking
- Keep devices updated – Regular security updates
- Use mobile hotspots – Personal hotspots when possible
- Monitor for suspicious activity – Watch for unusual network behavior
Quick Facts
Severity Level
8/10
Goal
Intercept wireless traffic and steal data
Method
Fake Wi-Fi access point with stronger signal
Targets
Public Wi-Fi users, corporate networks
Prevention
VPN, certificate validation, network monitoring
Related Terms