Affluent Savvy
Photo by Anete Lusina Pexels Logo Photo: Anete Lusina

Is a evil twin a thing?

An evil twin attack is a hack attack in which a hacker sets up a fake Wi-Fi network that looks like a legitimate access point to steal victims' sensitive details. Most often, the victims of such attacks are ordinary people like you and me.

Which Psalm is for success?
Which Psalm is for success?

- Psalm 92:4. The Lord will make us prosperous, and our land will produce rich harvests. - Psalm 85:12. You bless those who obey you, Lord; your...

Read More »
What are 3 things money can't buy?
What are 3 things money can't buy?

Money can't buy happiness at all Happiness: Money doesn't buy happiness. ... Time: No matter how rich you are, you can't get back time once it's...

Read More »
Awaken your dormant DNA ability to attract wealth effortlessly
Awaken your dormant DNA ability to attract wealth effortlessly

The simple yet scientifically proven Wealth DNA method laid out in the report allows you to effortlessly start attracting the wealth and abundance you deserve.

Learn More »

What is an evil twin attack?

An evil twin attack is a hack attack in which a hacker sets up a fake Wi-Fi network that looks like a legitimate access point to steal victims’ sensitive details. Most often, the victims of such attacks are ordinary people like you and me. The attack can be performed as a man-in-the-middle (MITM) attack. The fake Wi-Fi access point is used to eavesdrop on users and steal their login credentials or other sensitive information. Because the hacker owns the equipment being used, the victim will have no idea that the hacker might be intercepting things like bank transactions. An evil twin access point can also be used in a phishing scam. In this type of attack, victims will connect to the evil twin and will be lured to a phishing site. It will prompt them to enter their sensitive data, such as their login details. These, of course, will be sent straight to the hacker. Once the hacker gets them, they might simply disconnect the victim and show that the server is temporarily unavailable.

Evil twin attack example

The most common evil twin attack scenario you may come across in the wild is one with Captive Portals. Many public Wi-Fi networks use web pages that require your login details to connect you to the internet. The goal of this attack is to fool the victim into giving their authentication details for a legitimate Wi-Fi network. Once the hacker has these details, they can log into the network, take control of it, monitor unencrypted traffic, and perform other MITM attacks. Let’s delve deeper into what happens at every step of this attack.

Step 1: hacker sets up a fake wireless access point

A hacker chooses a public place that has many hotspots, such as your local Starbucks or an airport. Such places usually have multiple Wi-Fi access points with the same name. It’s good if you are walking around the building and don’t want to lose your connection, but it also makes the hacker's job much easier when it comes to creating a fake hotspot with the same Wi-Fi name. Now the bad actor can use anything from a network card, tablet, or laptop to a portable router or a Wi-Fi Pineapple (if they need more range) to create a hotspot. It’s pretty easy! Just think about the last time you used your phone as a hotspot to share a connection with your other devices or your friends. That’s exactly what a hacker does; however, they use the same Service Set Identifier (SSID) name, also known as simply the Wi-Fi name, as the legitimate one does. Why does this matter? Because most devices aren’t clever enough to distinguish between a legitimate and a fake access point if they have the same SSID. (Some hackers can go as far as cloning the MAC address of the trusted network.) That’s why it’s called an evil twin!

Is beige color wallet lucky?
Is beige color wallet lucky?

Yellow, brown and beige: These are earth colors. These colors give your wealth stability and help you save money. It also protects your money. May...

Read More »
Is the color blue in the Bible?
Is the color blue in the Bible?

Forty-nine times the Bible mentions a perfect, pure blue, a color so magnificent and transcendent that it was all but impossible to describe. Yet,...

Read More »

Step 2: hacker creates fake Captive Portal

If you’ve ever used public Wi-Fi, you have probably seen a Captive Portal page. They usually either ask for some basic information about you or prompt you to enter Wi-Fi login and password. The problem with Captive Portals is that there’s no standard on how they should look, and they are usually poorly designed. Those who use public Wi-Fi are so used to them being this way that it’s hard to tell the difference between a legitimate page and a fake one. Unfortunately, if you come across the latter, it will send your details straight to the hacker. Hackers might miss this step if they are setting up an evil twin where Wi-Fi network is open and thus doesn’t have a captive portal. If the legitimate Wi-Fi has a password, faking a captive portal helps the hacker to get login details and connect to the network.

Step 3: hacker makes victims connect to evil twin Wi-Fi

Now that the hacker has a hotspot and a captive portal, they need to make people ditch the legitimate connection and connect to theirs. This can be done in two ways: They create a stronger Wi-Fi signal by positioning themselves closer to their victims, which will result in nearby devices automatically connecting to the evil twin. They kick everyone off the main network by DDoSing them, or by flooding them with deauthentication packets. The devices connected to the legitimate network will be disconnected, which will lead users back to their Wi-Fi connection page. Now they will see a new network with an identical name, which most likely will state ‘Unsecure’. This will set off alarm bells for security-aware users, but many people will simply brush it off. This method might not work in an office environment, where it would raise suspicion.

Step 4: hacker steals login details

If the evil twin has a fake captive portal, the user will be directed straight to the login page when they click on the new network. They will be required to enter the same login details they used the first time they connected to a legitimate network. This time round, however, they are sending these details to the hacker. Now that the hacker has them, they can monitor network traffic and what you do online. If you tend to use the same login details for all your accounts, the hacker could also use them in credential stuffing attacks.

How to protect yourself

What money can do to a person?
What money can do to a person?

Here are seven things you should know about the psychology of money and wealth. More money, less empathy? ... Wealth can cloud moral judgment. ......

Read More »
What numbers mean abundance?
What numbers mean abundance?

12, 18, 20, 24, 30, 36, 40, 42, 48, 54, 56, 60, 66, 70, 72, 78, 80, 84, 88, 90, 96, 100, 102, 104, 108, 112, 114, 120, ...

Read More »
Awaken your dormant DNA ability to attract wealth effortlessly
Awaken your dormant DNA ability to attract wealth effortlessly

The simple yet scientifically proven Wealth DNA method laid out in the report allows you to effortlessly start attracting the wealth and abundance you deserve.

Learn More »

Don’t log into any accounts on public Wi-Fi . This way, the hacker will not be able to steal your credentials and use them against you. . This way, the hacker will not be able to steal your credentials and use them against you. Avoid connecting to Wi-Fi hotspots that say ‘Unsecure,’ even if it has a familiar name. even if it has a familiar name. Use 2-factor-authentication for all your sensitive accounts . This way, even if a hacker gets hold of your login credentials, they will still struggle to get into your accounts. . This way, even if a hacker gets hold of your login credentials, they will still struggle to get into your accounts. Learn to recognize social engineering attacks, phishing, and spoofed URLs. Only visit HTTPs websites, especially when on open networks. HTTPs websites provide end-to-end encryption, making it difficult or impossible for hackers to see what you do when you visit them. Don’t dismiss your device's notifications , especially if you were kicked off the network and you’re connecting to what you think is a known Wi-Fi network. If your device recognizes it as a new network, don’t ignore it! , especially if you were kicked off the network and you’re connecting to what you think is a known Wi-Fi network. If your device recognizes it as a new network, don’t ignore it! Don’t autosave Wi-Fi on your device because when it’s not connected to your home or office networks, it will transmit so-called probes. They can give out a lot of information about you, including your home address. Hackers can sniff this information and pretend to be your home network. because when it’s not connected to your home or office networks, it will transmit so-called probes. They can give out a lot of information about you, including your home address. Hackers can sniff this information and pretend to be your home network. Use a VPN whenever you connect to a public hotspot. It will encrypt your traffic before it leaves your device, making sure that no one sniffing the traffic can see your browsing behaviors.

Who is the woman with alabaster jar?
Who is the woman with alabaster jar?

Mary of Magdala She whom Luke calls the sinful woman, whom John calls Mary, we believe to be the Mary from whom seven devils were ejected according...

Read More »
Which vitamin is depleted by stress?
Which vitamin is depleted by stress?

Vitamin B6 Vitamin B6 helps to relieve stress, yet stress depletes B6 so it is crucial that your diet supplies plentiful levels of this nutrient...

Read More »
Awaken your dormant DNA ability to attract wealth effortlessly
Awaken your dormant DNA ability to attract wealth effortlessly

The simple yet scientifically proven Wealth DNA method laid out in the report allows you to effortlessly start attracting the wealth and abundance you deserve.

Learn More »
How to make him feel guilty for ignoring you?
How to make him feel guilty for ignoring you?

15 tips to make him regret ignoring you Express your feelings (to him) One of the most direct ways to learn how to make him regret ignoring you is...

Read More »
Awaken your dormant DNA ability to attract wealth effortlessly
Awaken your dormant DNA ability to attract wealth effortlessly

The simple yet scientifically proven Wealth DNA method laid out in the report allows you to effortlessly start attracting the wealth and abundance you deserve.

Learn More »
What net worth is considered poor?
What net worth is considered poor?

about $6,500 If a family has less than about $6,500 in assets, they are considered to be net worth poor. Feb 4, 2021

Read More »