Professional Documents
Culture Documents
NAME USN
Suchith Narayan 1BI14CS160
User-Side Wi-Fi Evil Twin Omar Nakhila, IEEE,2016 Evil Twin Attack
Attack Detection Using Cliff Zou
Random Wireless Channel
Monitoring
“A method which is used to show how Social
Engineering vulnerabilities are exploited and prevent
attacks.”
The attacker tries to gather information about the target
The information about the target can be collected from
various resources and means, such as dumpster diving,
the company's website, public documents, physical
interactions, and so on
Reconnaissance is necessary when targeting a single
user.
The attacker makes the initial move by trying to start a
conversation with the selected target
This phase establishes a working relationship with the
target.
This is a critical point as the quality of the relationship
built by the attacker determines the level of cooperation
and extent to which the target will go to help the
attacker accomplish the goal.
Attacker uses both information and relationships to
actively infiltrate the target
Attacker is focused on maintaining the momentum of
compliance that was built in phase 2 without raising
suspicion
Exploitation can take place through the divulging of
seemingly unimportant information or access
granted/transferred to the attacker.
1. Phishing
2. Vishing
3. PiggyBacking
4. Shoulder surfing
5. Dumpster diving
Involves fake emails, websites, ads designed to
impersonate real systems with the tricking the user.
Can target specific entities (“spear phishing”)
Phishing over phone
Calling the help desk pretending to be someone else
Usually an employee or someone with authority
Tailgating
Someone asks you to hold the door open behind you
because they forgot their company ID card.
Ultimately obtains unauthorized access to the building
Someone can watch the keys you press when entering
your password
clone
Cloned page
Original page
Target site is cloned, and the fake page is used for
Phishing.
Login credentials are then extracted from the fake page.
User is redirected back to the original site.
A phishing based network attack.
Client Client
Client 2 3
1
AP
Attacker creates a Rogue AP with the same name and
MAC address as the a legitimate access point (LAP)
DeAuth frames are broadcasted to the LAP
Client Client
Client 2 3
1 Evil
Twin
DeAuth
AP
Clients are disconnected from the LAP
Client Client
Client 2 3
1 Evil
Twin
Disconnected
DeAuth
AP
Clients are reconnected to the Rogue AP as it has same
name and MAC address
Attacker with phishing gains the password of the LAP
Client Client
Client 2 3
1 Evil
Twin
DeAuth
AP
Social engineering penetration testing will uncover
security weaknesses in the following areas:
Physical security (of the entire building and particularly
sensitive areas).
Corporate security policies connected to proper usage
and disposal of sensitive data.
Employees' security awareness and implementation.
Sl.
Reference
No.
1. “Going White Hat: Security Check by Hacking Employees Using Social
Engineering Techniques”, Zrinka Lovrić Švehla, Ivan Sedinić, Luka Pauk,IEEE,
2016.
2. “An Analysis of Social Engineering Principles in Effective Phishing”, Ana Ferreira,
Gabriele Lenzini, IEEE, 2015.
3. “User-Side Wi-Fi Evil Twin Attack Detection Using Random Wireless Channel
Monitoring”, Omar Nakhila,Cliff Zou, IEEE, 2016.
4. “Effective Defense Schemes for Phishing Attacks on Mobile Computing
Platforms”, Longfei Wu, Xiaojiang Du, IEEE, 2015.