I am going to try to keep this sweet and simple.. im not going into great detail, but as complicated as I make it sound here know there are apps out there that do all this with just a few clicks that any moron could use.
Its called Man in the Middle attack, or The Evil Twin Access Point
Simply works like this, every one of your wifi clients right now have saved there password and are configured to connect to: YourWiFiNet
Now this password can be a billion characters long and the crypto is unbreakable, but I can still get by all that by doing this:
I operate an "Evil Twin" and run a WiFi network also called: "YourWiFiNet", its that fucking simple.. now none of your devices know whom is the evil twin and both networks look like there the same.
Sooner or later they will connect to my access point and I will say a password is required yet accept any password given to me, and then I will connect to the real "YourWiFiNet" and use the login you just gave me and bridge the connection.. now I am on your network and the device that just gave me the password is also on your network.. however I can see all the traffic for the devices connected to me so any video streams are a matter of simply decoding for my pleasure.
Now for the kicker, I dont really have to wait at all.. WiFi DEAUTH packets instruct the device to disconnect and then they will attempt to reconnect instantly.. All wireless devices in range are seen in a simple wifi scanner and these packets are not encrypted even if you have encryption enabled and it is trivial to pretend to be your access point asking you to DEAUTH.. so what I do is just send a never ending stream of DEAUTH packets to a device on your network and you will have no choice but to connect to my evil twin.. if I was lazy I could just flood these packets out and knock all your wifi devices off until I stopped, if I didn't actually care about getting into your network.. no sophisticated jamming devices, just an app that can run on most phones is capable of this.
This whole attack can be entirely automated, allowing anyone with the right tools to compromise your wifi in less than a min..
There is only one way to stop this attack, and that is to use enterprise authentication with an external authentication server and certificate authority (WPA-EAP-TLS), its far too complicated for most all of you to deploy and if you do most of your WiFi devices wont be able to use it.
Cheers,
-R
Its called Man in the Middle attack, or The Evil Twin Access Point

Simply works like this, every one of your wifi clients right now have saved there password and are configured to connect to: YourWiFiNet
Now this password can be a billion characters long and the crypto is unbreakable, but I can still get by all that by doing this:
I operate an "Evil Twin" and run a WiFi network also called: "YourWiFiNet", its that fucking simple.. now none of your devices know whom is the evil twin and both networks look like there the same.
Sooner or later they will connect to my access point and I will say a password is required yet accept any password given to me, and then I will connect to the real "YourWiFiNet" and use the login you just gave me and bridge the connection.. now I am on your network and the device that just gave me the password is also on your network.. however I can see all the traffic for the devices connected to me so any video streams are a matter of simply decoding for my pleasure.
Now for the kicker, I dont really have to wait at all.. WiFi DEAUTH packets instruct the device to disconnect and then they will attempt to reconnect instantly.. All wireless devices in range are seen in a simple wifi scanner and these packets are not encrypted even if you have encryption enabled and it is trivial to pretend to be your access point asking you to DEAUTH.. so what I do is just send a never ending stream of DEAUTH packets to a device on your network and you will have no choice but to connect to my evil twin.. if I was lazy I could just flood these packets out and knock all your wifi devices off until I stopped, if I didn't actually care about getting into your network.. no sophisticated jamming devices, just an app that can run on most phones is capable of this.
This whole attack can be entirely automated, allowing anyone with the right tools to compromise your wifi in less than a min..
There is only one way to stop this attack, and that is to use enterprise authentication with an external authentication server and certificate authority (WPA-EAP-TLS), its far too complicated for most all of you to deploy and if you do most of your WiFi devices wont be able to use it.
Cheers,
-R
Last edited by a moderator: