When a client is in the process of associating with an access point the signal strength is very important. Devices capable of connecting to a wireless network can connect to any access point as long as the device is within signal range of the access point and vice versa. This situation may present the WiFi enabled device to be within range of several access points an any one given time and this will grant the attacker with an expanded attack surface. To perform this kind of attack, the attacker will set up a rogue access point with a very strong signal inviting the victim to connect to the honeyspot access point with the intend of gathering information. This attack is very similar to an Evil Twin attack where the attacker will set up a rogue access point with a very strong signal and use the same SSID as the corporate SSID to lure wireless devices to connect to the rogue access point instead of the legitimate corporate access point.
Announcement
Collapse
No announcement yet.
WiFi - Honeyspot Attack
Collapse