The IT Law Wiki

Evil twin attack

32,062pages on
this wiki
Add New Page
Add New Page Talk0

Definition Edit

In an evil twin attack,

the attacker gathers information about a public access point, then sets up his or her own system to impersonate the real access point. The attacker will use a broadcast signal stronger than the one generated by the real access point.[1]

Overview Edit

"Unsuspecting users will connect using the stronger, bogus signal. Because the victim is connecting to the internet through the attacker’s system, it’s easy for the attacker to use specialized tools to read any data the victim sends over the internet. This data may include credit card numbers, username and password combinations, addresses, and other personal information."[2]

References Edit

  1. Using Wireless Technology Securely, at 4.
  2. Id.

Also on Fandom

Random Wiki