header bg

Scan QR code or get instant email to install app

Question:

What type of attack uses a second wireless access point (WAP) that broadcasts the same SSID as a legitimate access point, in trying to get users to connect to the attacker's WAP?

A Evil twin.
explanation

Evil twin attacks use a malicious access point configured to appear to be identical to a legitimate AP. Attackers wait for their targets to connect via the evil twin, and can then capture or modify traffic however they wish. IP spoofing uses the IP address of a system already on the network, Trojan horses are malware that appears to be legitimate software or files, and privilege escalation is the process of using exploits to gain higher privileges.

Related Information

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

*