CAPEC 615 Evil Twin Wi-Fi Attack

Draft Detailed Unknown Risk
Severity Low

Description

Adversaries install Wi-Fi equipment that acts as a legitimate Wi-Fi network access point. When a device connects to this access point, Wi-Fi data traffic is intercepted, captured, and analyzed. This also allows the adversary to use \'adversary-in-the-middle\' (CAPEC-94) for all communications.

Mitigations

1

Consequences

Relationships