Structure and Logic of the Evil Twin Attack in the context of Open Source Software

Abstract:

Wireless network security issues focus primarily on two areas. The first area concerns the situation where the communication layer in WLANs is beyond the control of the administrator. The second area concerns the end user. From this perspective, the Evil Twin and Rouge AP attacks currently pose the greatest threat. These attacks are relatively easy to carry out and are accompanied by a high degree of effectiveness. This brief article describes the logic behind one of the attacks, and demonstrates the use of available methods and techniques using open source software. The work aims to present the Evil Twin attack in the current realities and on the modern standards of network operation. Keywords: evil twin, wireless LAN, MITM (Man in the Middle), WLAN Security