Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

11/14/2018
02:30 PM
Ryan Orsi
Ryan Orsi
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv

Understanding Evil Twin AP Attacks and How to Prevent Them

The attack surface remains largely unprotected from Wi-Fi threats that can result in stolen credentials and sensitive information as well as backdoor/malware payload drops.
3 of 3

Source: Ryan Orsi, WatchGuard
Source: Ryan Orsi, WatchGuard

3 of 3
Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
ryanorsi
50%
50%
ryanorsi,
User Rank: Author
11/15/2018 | 9:04:54 PM
Re: Tunnel Through the Evil Twins
Great advice here, particularly the one about not letting your devices auto-connect to previously joined SSIDs.  Take note everyone, clear your saved Wi-Fi network SSID names from your client devices.  I know it can be a pain, but if you want to see the consequences, just do a quick web search for 'Ryan Orsi Pineapple' and you'll get the picture.  Pineapples are great pen-testing tools by the way, helping push the industry in the right direction towards a safer Wi-Fi experience for users.
ddvzlnz
100%
0%
ddvzlnz,
User Rank: Apprentice
11/15/2018 | 9:37:04 AM
Tunnel Through the Evil Twins
Nice article on a subject it seems like people don't think about anymore.

 

I always use a TinyHardwareFirewall when I'm on open networks.  My laptop talks to the THF and it talks to the Acesss Point. The first thing I do is start the VPN and then go about my business.  I expect all of my zeros and ones to be viewable on an open network so I make sure they are all ecrypted.

Also, don't let your devices automaticly connect to any SSID it recognizes.  That is like having your house automaticly open the door whenever someone rings the doorbell.

 

 
MoviePass Leaves Credit Card Numbers, Personal Data Exposed Online
Kelly Sheridan, Staff Editor, Dark Reading,  8/21/2019
New FISMA Report Shows Progress, Gaps in Federal Cybersecurity
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/21/2019
Aviation Faces Increasing Cybersecurity Scrutiny
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/22/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-15482
PUBLISHED: 2019-08-23
selectize-plugin-a11y before 1.1.0 has XSS via the msg field.
CVE-2019-15483
PUBLISHED: 2019-08-23
Bolt before 3.6.10 has XSS via a title that is mishandled in the system log.
CVE-2019-15484
PUBLISHED: 2019-08-23
Bolt before 3.6.10 has XSS via an image's alt or title field.
CVE-2019-15485
PUBLISHED: 2019-08-23
Bolt before 3.6.10 has XSS via createFolder or createFile in Controller/Async/FilesystemManager.php.
CVE-2019-15486
PUBLISHED: 2019-08-23
django-js-reverse (aka Django JS Reverse) before 0.9.1 has XSS via js_reverse_inline.