Rogue Access Point/Evil Twin
A very simple attack where an attacker installs a rogue AP inside a target network. This tricks users into connecting to it and allows the attacker to establish a network backdoor.
An "evil twin" attack is when a rogue access point is configured to mirror the existing corporate network. An attacker will typically set this up to redirect to a cloned captive portal or website. The attacker can then easily injected spoofed DNS records.
Last updated