December 2019
Beginner
510 pages
12h 7m
English
Because you are not physically connecting a device to a network cable, any wireless network is susceptible to Man-In-The-Middle (MITM) attacks through the use of rogue access points. A common form of rogue access point is an evil twin. An evil twin is an access point that pretends to be a legitimate access point in that it has the same SSID, but usually has a stronger signal, so you are more likely to connect to the rogue one. Once you connect to the illegitimate access point, the attacker can easily sniff your data transiting through. To avoid suspicion, an attacker would forward your data to the original destination, and from the destination back to you.
The only real prevention for this is to scan your ...