Evil Twin Attack via Kali on Odroid XU4

From Embedded Lab Vienna for IoT & Security
Revision as of 10:09, 9 November 2020 by KBuehn (talk | contribs) (Created page with "== Summary == The Evil Twin Attack (ET Attack) is a social engineering attacks. It is comparable to a phishing attack, with the difference that ET is carried out via WLAN. T...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Summary

The Evil Twin Attack (ET Attack) is a social engineering attacks. It is comparable to a phishing attack, with the difference that ET is carried out via WLAN. The goal is to steal sensitive data from the user. This data can be passwords or entire sessions to access e-mail accounts or social networks.

To get access to the user's data, the ET pretends to be an access point. The SSID is exactly the same as that of the WLAN known to the user. After the user's connection to the real WLAN access point has been terminated, the ET appears in the same list - with the same SSID. The user thus thinks that the access point is simply displayed twice and connects to the one that offers a better connection. It is therefore important that the attacker places the fake access point in the immediate vicinity of the victim. Once the victim is connected to the ET, the ET can act unnoticed as a Man-in-the-Middle (MitM).

To be able to impersonate a fake WLAN, the attacker needs the password of the actual router. To obtain this password, methods of social engineering attack are used. The better these measures are taken, the more likely it is that the potential victim will fall into the trap.

Requirements

  • Operating system: Kali Linux ODROID-XU3
  • Packages: git emacs

Hardware:

  • WLAN
  • Client connected to WLAN
  • ODROID XU4 single-board computer (incl. power supply unit 5V/4A)
  • eMMC
  • microSD + adapter
  • Mouse
  • Keyboard
  • Monitor (via HDMI)
  • WLAN Adapter (e.g. Alfa AWUS036EAC)

In order to complete these steps, you must have followed Some Other Documentation before.

Description

Step 1

Enter these commands in the shell

echo foo
echo bar

Step 2

Make sure to read

  • War and Peace
  • Lord of the Rings
  • The Baroque Cycle

Used Hardware

Device to be used with this documentation Maybe another device to be used with this documentation

Courses

References