Rogue Access Point & Evil-Twin Attacks
Rogue Access Point (AP)
A rogue AP is an unauthorized device connected directly to the network, potentially bypassing perimeter controls. These APs may:
Circumvent network segmentation
Provide unauthorized access to restricted sections of a network
Occasionally, infiltrate air-gapped networks
Evil-Twin
An evil-twin AP is usually a standalone access point, separate from the network, often used by attackers to intercept data via man-in-the-middle (MITM) attacks. Such APs:
Are commonly set up to capture wireless credentials and other sensitive information
Might host hostile portals to lure users into disclosing credentials
Detection with Airodump-ng
We can utilize airodump-ng with an ESSID filter to detect Evil-Twin APs:
sudo airodump-ng -c 4 --essid HTB-Wireless wlan0 -w rawExample output:
CH 4 ][ Elapsed: 1 min ][ 2023-07-13 16:06
BSSID PWR RXQ Beacons #Data, #/s CH MB ENC CIPHER AUTH ESSID
F8:14:FE:4D:E6:F2 -7 100 470 155 0 4 54 OPN HTB-Wireless
F8:14:FE:4D:E6:F1 -5 96 682 0 0 4 324 WPA2 CCMP PSK HTB-Wireless The example shows an attacker-created open AP with an identical ESSID to our legitimate AP, suggesting a hostile portal attack.
Beacon Analysis for Evil-Twin Detection
To confirm anomalies, examine beacon frames with this Wireshark filter:
(wlan.fc.type == 00) and (wlan.fc.type_subtype == 8)Beacon Analysis:
RSN Information: The legitimate AP’s RSN info may indicate WPA2 with AES/TKIP and PSK. In contrast, a malicious AP might lack RSN information.
Additional Fields: For sophisticated attacks, check vendor-specific info and other unique identifiers that might be missing in the attacker’s AP.
Identifying Compromised Users
In cases of open-network evil-twin attacks:
Use the following Wireshark filter to isolate traffic for the suspicious AP:
(wlan.bssid == F8:14:FE:4D:E6:F2)Detecting ARP requests from a client device on this network could indicate a potential compromise. Record:
Client device’s MAC address
Host name
Take responsive actions like password resets to mitigate risk.
Detecting Rogue Access Points
Rogue AP detection often involves network device monitoring. Look for:
Unrecognized networks with strong signals, especially open networks
Potential hotspots in close proximity (e.g., Windows hotspots)
Unfamiliar networks without encryption may indicate rogue access points set up to bypass network security.
Last updated