O'Reilly logo

Kali Linux Wireless Penetration Testing Cookbook by Sean-Philip Oriyano

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Creating an evil twin

The first type of attack that can be used to attack confidentiality is known as the evil twin attack, or evil twin AP. This type of attack is generally not an attack that is used as a standalone, but rather used in conjunction with other attacks, as we will see.

The most common name for the type of attack we are mentioning here tends to be the evil twin moniker. However, do not be surprised to hear names such as rogue access point, shadow access point, wireless honeypot, as well as many other potential names. No matter what you call it, if you understand the mechanics of what is happening in this attack, you'll be fine no matter what name it goes by.

An evil twin attack takes place when a rogue access point is configured ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required