-
Book Overview & Buying
-
Table Of Contents
CompTIA PenTest+ Study Guide
By :
While wireless and wired networks share many of the same functions, protocols, and behaviors, there are a number of attack methods that are specifically used for wireless networks, access points, and wireless clients. These attacks focus on the way that wireless devices connect to networks, how they authenticate, and other features and capabilities specific to wireless networks.
Evil twin attacks work by creating bogus access points that unsuspecting users connect to. This makes them useful for man-in-the-middle attacks like those discussed earlier in this chapter. While it is possible to create an evil twin of a secured access point, more sophisticated users are likely to notice differences like having to accept new security certificates or other changes.
Change the font size
Change margin width
Change background colour