Describe how an attacker can hijack a wireless connection.

What will be an ideal response?

Using an evil twin, an attacker can trick a corporate mobile device to connect the imposter device instead. The attacker could then perform a wireless man-in-the-middle attack.
This type of attack makes it appear that the wireless device and the network computers are communicating with each other, when actually they are sending and receiving data through an evil twin AP (the "man-in-the-middle"). As the man-in-the-middle receives data from the devices it passes it on to the recipient so that neither computer is aware of the man-in-the-middle's existence.

Computer Science & Information Technology

You might also like to view...

A(n) ________ object is made up of several objects that can be moved or copied as one object

Fill in the blank(s) with correct word

Computer Science & Information Technology

__________ are most frequently used in branch instructions.

A. Comments B. Labels C. Operands D. Mnemonics

Computer Science & Information Technology