There’s An Evil Twin Scarier Than A Doppelgänger

Many of you may not remember several of the earlier recessions. Or if so, they didn’t affect you, but for those of us who remembers them and they affected us we know that with them come are lots of ways to bankrupt you by scammers.

Evil twin

I’m no computer expert so bear with me if some of the techie terminology is wrong. (wireless networks)

From Wikipedia, the free encyclopedia.
“Evil twin” wireless networks –

An evil twin is a fraudulent Wi-Fi access point that appears to be legitimate but is set up to eavesdrop on wireless communications. It primary target hotspots but the with the covid-19 virus it is increasingly becoming a problem again.

The evil twin is the wireless LAN equivalent of the phishing scam.

This type of attack may be used to steal the passwords of unsuspecting users, either by monitoring their connections or by phishing, which involves setting up a fraudulent web site and luring people there.

1 Method
2 Using Captive portals
3 Redirects
4 References
5 External links


The attacker snoops on Internet traffic using a bogus wireless access point. Unwitting web users may be invited to log into the attacker’s server, prompting them to enter sensitive information such as usernames and passwords. Often, users are unaware they have been duped until well after the incident has occurred.

When users log into unsecured (non-HTTPS) bank or e-mail accounts, the attacker intercepts the transaction, since it is sent through their equipment. The attacker is also able to connect to other networks associated with the users’ credentials.

Fake access points are set up by configuring a wireless card to act as an access point (known as HostAP). They are hard to trace since they can be shut off instantly. The counterfeit access point may be given the same SSID and BSSID as a nearby Wi-Fi network. The evil twin can be configured to pass Internet traffic through to the legitimate access point while monitoring the victim’s connection,[3] or it can simply say the system is temporarily unavailable after obtaining a username and password.

One of the most commonly used attacks under evil twins, is a captive portal. At first the attacker would create a fake wireless access point that has a similar Essid to the legitimate access point, after this has been done, the attacker then Denial-of-service attack the legitimate access point which will cause it to go offline, thus far the clients would connect to the fake access point automatically since it is similar to the legitimate one. The clients would then be led to a web portal that will be requesting them to enter their password, and this would work as a social engineering attack. When the clients have entered their legitimate access point’s password the password will be sent to the attacker.

KARMA attack, a variant on the evil twin attack
Snarfing-

Snarfing” is the action of grabbing data and using it without the owner’s consent. In the example shown above, a false access point is created that strongly emulates the legitimate access point.

Wireless LAN Security

To some people this can be very tempting when you don’t have a large data plan to use free Wi-Fi at places like Starbucks or hotels.


Evil Twin



About unholypursuit

A. White, an award winning former librarian, who is also a long time member of Romantic Time and Publisher's Weekly. A. White has been writing for over fifteen years. She took classes in creative writing in college, specializing in ancient myths and legends. and later at a local community center while living in Chicago. In college she won the national contest to verbally list every country in the world, it's capital and ingenious language. Her works are mainly horror, fantasy, extreme, and sci-fi as well as, as some may says, "the truly strange predicament and puzzling." Books that I've written are "Clash with the Immortals, and eleven others which are part of the "Unholy Pursuit saga,". She has been working on the Chronicles since 2007. She wished to complete them all before introducing them to public so the readers wouldn't have to for the continuation to be written. The ideas of the book come from classic literature such as whose work greatly influence the world world such as Homer, Sophocles, Herodotus, Euripides, Socrates, Hippocrates, Aristophanes, Plato, Aristotle and many more. The "Book of Enoch" influenced the usage of Azazael as a main character and love interest. I created the primary main character from the Chronicle of Saints. I wanted to show them as real flesh and blood with thoughts, desires and yearning as any human. Not as they are so often depicted. So I created one of my own to show her as a real human that everyone can relate to.
This entry was posted in paranormal romance,. Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.