Page 804 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 804

preferred over the original valid wireless network’s SSID. For example,
               if the original SSID is “ABCcafe,” then the rogue WAP SSID could be

               “ABCcafe-2,” “ABCcafe-LTE,” or “ABCcafe-VIP.” The rogue WAP’s
               MAC address and channel do not need to be clones of the original
               WAP. These alternate names may seem like better network options to
               new visitors and thus trick them into electing to connect to the false
               network instead of the legitimate one.

               The defense against rogue WAPs is to be aware of the correct and valid

               SSID. It would also be beneficial for an organization to operate a
               wireless IDS to monitor the wireless signals for abuses, such as newly
               appearing WAPs, especially those operating with mimicked or similar
               SSID and MAC values.


               Evil Twin

               Evil twin is an attack in which a hacker operates a false access point
               that will automatically clone, or twin, the identity of an access point
               based on a client device’s request to connect. Each time a device

               successfully connects to a wireless network, it retains a wireless profile
               in its history. These wireless profiles are used to automatically
               reconnect to a network whenever the device is in range of the related
               base station. Each time the wireless adapter is enabled on a device, it
               wants to connect to a network, so it sends out reconnection requests to
               each of the networks in its wireless profile history. These reconnect
               requests include the original base station’s MAC address and the

               network’s SSID. The evil twin attack system eavesdrops on the
               wireless signal for these reconnect requests. Once the evil twin sees a
               reconnect request, it spoofs its identity with those parameters and
               offers a plaintext connection to the client. The client accepts the
               request and establishes a connection with the false evil twin base
               station. This enables the hacker to eavesdrop on communications

               through a man-in-the-middle attack, which could lead to session
               hijacking, data manipulation credential theft, and identity theft.

               This attack works because authentication and encryption are managed
               by the base station, not enforced by the client. Thus, even though the
               client’s wireless profile will include authentication credentials and
               encryption information, the client will accept whatever type of
   799   800   801   802   803   804   805   806   807   808   809