Which of the following would an adversary do while conducting an evil twin attack?
A.
Trick users into using an AP with an SSID that is identical to a legitimate network
B.
Manipulate address resolution to point devices to a malicious endpoint
C.
Present an identical MAC to gain unauthorized access to network resources
D.
Capture data in transit between two legitimate endpoints to steal data
The Answer Is:
A
This question includes an explanation.
Explanation:
An evil twin attack sets up a rogue AP with the same SSID as a legitimate wireless network, tricking users into connecting. Once connected, the attacker can intercept traffic or harvest credentials.
B. Describes ARP spoofing.
C. Describes MAC spoofing.
D. Describes on-path attacks, which may follow, but the evil twin method begins with SSID impersonation.