Evil Twin Attack via Kali on Odroid XU4
Summary
The Evil Twin Attack (ET Attack) is a social engineering attacks. It is comparable to a phishing attack, with the difference that ET is carried out via WLAN. The goal is to steal sensitive data from the user. This data can be passwords or entire sessions to access e-mail accounts or social networks.
To get access to the user's data, the ET pretends to be an access point. The SSID is exactly the same as that of the WLAN known to the user. After the user's connection to the real WLAN access point has been terminated, the ET appears in the same list - with the same SSID. The user thus thinks that the access point is simply displayed twice and connects to the one that offers a better connection. It is therefore important that the attacker places the fake access point in the immediate vicinity of the victim. Once the victim is connected to the ET, the ET can act unnoticed as a Man-in-the-Middle (MitM).
To be able to impersonate a fake WLAN, the attacker needs the password of the actual router. To obtain this password, methods of social engineering attack are used. The better these measures are taken, the more likely it is that the potential victim will fall into the trap.
Requirements
- Operating system: Kali Linux ODROID-XU3
- Packages: git emacs
Hardware:
- WLAN
- Client connected to WLAN
- ODROID XU4 single-board computer (incl. power supply unit 5V/4A)
- eMMC
- microSD + adapter
- Mouse
- Keyboard
- Monitor (via HDMI)
- WLAN Adapter (e.g. Alfa AWUS036EAC)
In order to complete these steps, you must have followed Some Other Documentation before.
Description
Step 1
Enter these commands in the shell
echo foo echo bar
Step 2
Make sure to read
- War and Peace
- Lord of the Rings
- The Baroque Cycle
Used Hardware
Device to be used with this documentation Maybe another device to be used with this documentation
Courses
- A course where this documentation was used (2017, 2018)
- Another one (2018)