Skip to Content
Applied Network Security
book

Applied Network Security

by Warun Levesque, Arthur Salmon, Michael McLafferty
April 2017
Intermediate to advanced
350 pages
8h 35m
English
Packt Publishing
Content preview from Applied Network Security

How to detect an evil twin?

Now that we have a better understanding of what an evil twin is, we can now discuss how to detect them. One of the best evil twin detection tools is called EvilAP_Defender. This tool helps cyber security teams detect and prevent evil twins from attacking users of the wireless network. When EvilAP_Defender detects an evil twin, a notification is sent to your e-mail. When a rogue access point is discovered EvilAP_Defender can execute a DoS attack on users to prevent them from connecting to the rogue access point. The DoS attacks allows for more time to plan a more calculated response to end the evil twin attack. The DoS attack will only target SSIDs with the same name as the real access point. To detect evil twins, ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Applied Network Security Monitoring

Applied Network Security Monitoring

Chris Sanders, Jason Smith
Network Protocols for Security Professionals

Network Protocols for Security Professionals

Yoram Orzach, Deepanshu Khanna
Cyber Security and Network Security

Cyber Security and Network Security

Sabyasachi Pramanik, Debabrata Samanta, M. Vinay, Abhijit Guha

Publisher Resources

ISBN: 9781786466273