An evil twin is a fraudulent Wi-Fi access point that appears to be legitimate but is set up to eavesdrop on wireless communications.
The evil twin is the wireless LAN equivalent of the phishing scam.
This type of attack may be used to steal the passwords of unsuspecting users, either by monitoring their connections or by phishing, which involves
setting up a fraudulent web site and luring people there.
The attacker snoops on Internet traffic using a bogus wireless access point.
Unwitting web users may be invited to log into the attacker's server, prompting them to enter sensitive information such as usernames and
passwords.
Fake access points are set up by configuring a wireless card to act as an access point.
They are hard to trace since they can be shut off instantly.
In this project:
The attack is split into two parts.
In the first part the attacker defines an access point and a user that he will want to attack,and then he disconnects the user from the network
In the second part the attacker establishes a fake access point with the same name of the network he is attacking, and lets the disconnected user
connect to it.
- Linux operating system, with two network interfaces,so that both can enter monitor mode.
- Python 2.7 and above
You can run the attack from the Python file: EvilTwin.py.
All you need to do is just to run the code on the terminal ► sudo python EvilTwin.py
There you will be asked to enter the names of the interfaces you would like to use.
The first is for sniffing net after attack nets.
The second to create the fake access point.
It is also possible to run only the second part of the attack, and only create a fake access point.
All you need is to run this on the terminal ► sudo python runFakeAP.py
If you just want to disconnect a user from the network, you can do so by setting line 93 in the 'EvilTwin.py' script as a comment.