Which on-path attack utilizes a wireless access point made to look as if it belongs to the network by mimicking the corporate network's SSID to eavesdrop on the wireless traffic?
The correct answer is C) evil twin.
Evil twin: An evil twin attack occurs when an attacker sets up a malicious wireless access point that mimics the legitimate network's SSID (Service Set Identifier). This false access point tricks users into connecting to it, believing it is part of the corporate network. Once connected, the attacker can eavesdrop on the network traffic, steal sensitive information, or carry out further attacks like Man-in-the-Middle (MitM). This is a type of on-path attack because the attacker positions themselves between the victim and the network.
Why the others are incorrect:
WEP-crack: WEP-crack refers to an attack where an attacker attempts to crack the WEP (Wired Equivalent Privacy) encryption used in older wireless networks. While it is a form of wireless attack, it doesn't involve mimicking a legitimate access point or eavesdropping by pretending to be the network.
Shoulder surfing: Shoulder surfing is a social engineering technique where an attacker observes someone's actions (such as typing passwords or PINs) from a close physical distance. It does not involve a wireless access point or eavesdropping on traffic.
Rogue AP: A rogue AP is an unauthorized access point connected to the network, often set up by an insider or attacker to bypass network security controls. While it is similar to an evil twin in that it can be malicious, the key distinction is that a rogue AP might not necessarily mimic the corporate network's SSID. An evil twin specifically mimics the legitimate network to trick users into connecting.
No Payment Cards Needed
Discover a range of courses designed to provide you with the knowledge and skills needed to excel in your chosen field.
You don’t need one month to study and pass your test.
With Prepsaret, it takes you a few days to grasp all the concepts needed to pass your exams