翻訳と辞書
Words near each other
・ Evlynn Smith
・ Evil Star
・ Evil Star (disambiguation)
・ Evil Star (novel)
・ Evil Stig
・ Evil Streets
・ Evil Superstars
・ Evil Things
・ Evil Thoughts
・ Evil Toons
・ Evil Town
・ Evil twin
・ Evil twin (disambiguation)
・ Evil Twin (EP)
・ Evil Twin (film)
Evil twin (wireless networks)
・ Evil Twin Brewing
・ Evil Under the Sun
・ Evil Under the Sun (1982 film)
・ Evil Under the Sun (disambiguation)
・ Evil Urges
・ Evil Warning
・ Evil Warriors
・ Evil Ways
・ Evil Weed
・ Evil Woman
・ Evil Woman (Crow song)
・ Evil Woman (Electric Light Orchestra song)
・ Evil Zone
・ Evil, Inc. (Hardy Boys)


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Evil twin (wireless networks) : ウィキペディア英語版
Evil twin (wireless networks)

Evil twin Router is a term for a rogue Wi-Fi access point that appears to be a legitimate one offered on the premises, but actually has been set up to eavesdrop on wireless communications.
An evil twin is the wireless version of the phishing scam. An attacker fools wireless users into connecting a laptop or mobile phone to a tainted hotspot by posing as a legitimate provider.
This type of evil twin attack may be used to steal the passwords of unsuspecting users by either snooping the communication link or by phishing, which involves setting up a fraudulent web site and luring people there.〔Wolfe, Daniel; "Security Watch", ''American Banker'', New York, NY: February 14, 2007, vol. 172, no. 31, p. 7 (A security firm used an evil twin as a test to obtain passwords from attendees at an RSA security conference) (Source type: Newspaper; ISSN: 00027561; ProQuest document ID: 1219496681; Text Word Count: 1097; Document URL: () (subscription)) Retrieved June 6, 2007〕
==Method==
The attacker uses a bogus wireless access point, purporting to provide wireless Internet services, but snooping on the traffic. When the users log into unprotected (non-HTTPS) bank or e-mail accounts, the attacker has access to the entire transaction, since it is sent through their equipment.
Unwitting web users are invited to log into the attacker's server with bogus login prompts, tempting them to give away sensitive information such as usernames and passwords. Often users are unaware they have been duped until well after the incident has occurred.
Users think they have logged on to a wireless hotspot connection when in fact they have been tricked into connecting to its evil twin by it sending a stronger signal within proximity to the wireless client.
Rogue access points are easy to set up, for example using a laptop with a wireless card that acts as an access point (known as "host-ap"), but are hard to trace since they can suddenly be shut off. An attacker can make his own wireless networks that appear to be legitimate by simply giving their access point the same SSID and BSSID to the Wi-Fi network on the premises. The rogue access point can be configured to pass the traffic through to the legitimate access point while monitoring the victim's traffic, or it can simply say the system is temporarily unavailable after obtaining a username and password.

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Evil twin (wireless networks)」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.