Airgeddon Used for an Evil Twin AP with Captive Portal
Full Video: https://nulb.app/x4a3p
Subscribe to Null Byte: https://goo.gl/J6wEnH
Kody's Twitter: / kodykinzie
Cyber Weapons Lab, Episode 010 (Recut Partial Episode)
WiFi networks can be set up by smart IT people, but that doesn't mean the users of the network are similarly techsavvy. We'll demonstrate how bad actors can use am evil twin attack to steal WiFi passwords. Essentially, they kick a user off their trusted network while creating a nearly identical fake one they connect to. This forces the victim to connect to the fake network and supply the WiFi password to regain internet access.
While a more technical user might spot this attack, it's surprisingly effective against those not trained to look for suspicious network activity. The reason it's so successful is that most users don't know what a real firmware update looks like, leading to confusion in recognizing that an attack is in progress. By knowing all this, it's easier to spot and avoid your WiFi password from being taken right from under you.
To learn more, check out the article and more indepth video on our website: https://nulb.app/x4a3p
Follow Null Byte on:
Twitter: / nullbyte
Flipboard: https://flip.it/3.Gf_0
Website: https://nullbyte.com
Weekly newsletter: https://eepurl.com/dE3Ovb
Vimeo: https://vimeo.com/channels/nullbyte