What's new

Evil Twin Attack Prevention?

  • SNBForums Code of Conduct

    SNBForums is a community for everyone, no matter what their level of experience.

    Please be tolerant and patient of others, especially newcomers. We are all here to share and learn!

    The rules are simple: Be patient, be nice, be helpful or be gone!

Rajjco

Regular Contributor
I have a couple of questions about this type of attack.

Detected an intruder in my network and I'm trying to prevent future incidents.

Found a couple of SSID's with the same name as my home network SSID In Asus Site Survey page my home SSID has a full bar connection while the rogue SSID has one bar only.

Can a rogue SSID get the wifi password of my home network when devices auto connect if it was within range?

If so how do you even prevent such attacks?
 
The "rogue" AP can NOT access the PSK (pre-shared key), if that's your concern. The PSK is *never* transmitted from the client to the AP during the WPA2/WPA3 4-way handshake.

For all intents and purposes, the only real way you're going to fall victim to this kind of attack is when dealing w/ *open* wifi, esp. one w/ a portal which requires its own authentication. If you're depending on that rather than WPA2/WPA3 for your security, that's a problem. But in most cases where you see this happening, it's public wifi, and invariably that network is completely isolated from the provider's own private network (assuming there is one).

So unless you're NOT following standard procedures like WPA2/WPA3 and using a strong, unique password (PSK), rogue APs shouldn't present a problem (security-wise), even if they're using the same SSID.

Seems to me the bigger problem is having your wireless clients continually attempt to access the rogue AP (unsuccessfully) over and over again. I've seen cases where the user had to lock down the client(s) to a specific AP based on the AP's MAC address (aka BSSID).

All that said, there's always the possibility of some other unknown vulnerability, or a failure to patch a known vulnerability on your part. Wifi is always a case of "use at your own risk" given you are *broadcasting* an access point to the public.
 
The "rogue" AP can NOT access the PSK (pre-shared key), if that's your concern. The PSK is *never* transmitted from the client to the AP during the WPA2/WPA3 4-way handshake.

For all intents and purposes, the only real way you're going to fall victim to this kind of attack is when dealing w/ *open* wifi, esp. one w/ a portal which requires its own authentication. If you're depending on that rather than WPA2/WPA3 for your security, that's a problem. But in most cases where you see this happening, it's public wifi, and invariably that network is completely isolated from the provider's own private network (assuming there is one).

So unless you're NOT following standard procedures like WPA2/WPA3 and using a strong, unique password (PSK), rogue APs shouldn't present a problem (security-wise), even if they're using the same SSID.

Seems to me the bigger problem is having your wireless clients continually attempt to access the rogue AP (unsuccessfully) over and over again. I've seen cases where the user had to lock down the client(s) to a specific AP based on the AP's MAC address (aka BSSID).

All that said, there's always the possibility of some other unknown vulnerability, or a failure to patch a known vulnerability on your part. Wifi is always a case of "use at your own risk" given you are *broadcasting* an access point to the public.
Thanks for the detailed explanation.

I had assumed that the PSK (pre-shared key) can be read by the "rogue" AP if one of my devices gets close to it. That's a relief that it cannot access It.
 

Similar threads

Latest threads

Support SNBForums w/ Amazon

If you'd like to support SNBForums, just use this link and buy anything on Amazon. Thanks!

Sign Up For SNBForums Daily Digest

Get an update of what's new every day delivered to your mailbox. Sign up here!
Top