Describe how an attacker can hijack a wireless connection.
What will be an ideal response?
Using an evil twin, an attacker can trick a corporate mobile device to connect the imposter device instead. The attacker could then perform a wireless man-in-the-middle attack.
This type of attack makes it appear that the wireless device and the network computers are communicating with each other, when actually they are sending and receiving data through an evil twin AP (the "man-in-the-middle"). As the man-in-the-middle receives data from the devices it passes it on to the recipient so that neither computer is aware of the man-in-the-middle's existence.
You might also like to view...
A(n) ________ object is made up of several objects that can be moved or copied as one object
Fill in the blank(s) with correct word
__________ are most frequently used in branch instructions.
A. Comments B. Labels C. Operands D. Mnemonics