Skip to Content
Networking Fundamentals
book

Networking Fundamentals

by Gordon Davies
December 2019
Beginner
510 pages
12h 7m
English
Packt Publishing
Content preview from Networking Fundamentals

Scanning for rogue access points

Because you are not physically connecting a device to a network cable, any wireless network is susceptible to Man-In-The-Middle (MITM) attacks through the use of rogue access points. A common form of rogue access point is an evil twin. An evil twin is an access point that pretends to be a legitimate access point in that it has the same SSID, but usually has a stronger signal, so you are more likely to connect to the rogue one. Once you connect to the illegitimate access point, the attacker can easily sniff your data transiting through. To avoid suspicion, an attacker would forward your data to the original destination, and from the destination back to you.

The only real prevention for this is to scan your ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Networking Fundamentals

Networking Fundamentals

Kevin Wallace
CCNA 200-301

CCNA 200-301

Kevin Wallace

Publisher Resources

ISBN: 9781838643508