Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil 312-50 Exam - Topic 12 Question 117 Discussion

Actual exam question for Eccouncil's 312-50 exam
Question #: 117
Topic #: 12
[All 312-50 Questions]

jane invites her friends Alice and John over for a LAN party. Alice and John access Jane's wireless network without a password. However. Jane has a long, complex password on her router. What attack has likely occurred?

Show Suggested Answer Hide Answer
Suggested Answer: C

An evil twin may be a fraudulent Wi-Fi access point that appears to be legitimate but is about up to pay attention to wireless communications.[1] The evil twin is that the wirelessLANequivalent of the phishing scam. This type of attack could also be wont to steal the passwords of unsuspecting users, either by monitoring their connections or by phishing, which involves fixing a fraudulent internet site and luring people there. The attacker snoops on Internet traffic employing a bogus wireless access point. Unwitting web users could also be invited to log into the attacker's server, prompting them to enter sensitive information like usernames and passwords. Often, users are unaware they need been duped until well after the incident has occurred. When users log into unsecured (non-HTTPS) bank or e-mail accounts, the attacker intercepts the transaction, since it's sent through their equipment. The attacker is additionally ready to hook up with other networks related to the users' credentials. Fake access points are found out by configuring a wireless card to act as an access point (known as HostAP). they're hard to trace since they will be shut off instantly. The counterfeit access point could also be given an equivalent SSID and BSSID as a close-by Wi-Fi network. The evil twin are often configured to pass Internet traffic through to the legitimate access point while monitoring the victim's connection, or it can simply say the system is temporarily unavailable after obtaining a username and password.


Contribute your Thoughts:

0/2000 characters
Lilli
1 day ago
Wait, how did they get on without the password?
upvoted 0 times
...
Gail
6 days ago
Sounds like piggybacking to me!
upvoted 0 times
...
Clay
12 days ago
I’m a bit confused, but I thought wardriving was more about searching for networks in a car, not really applicable here.
upvoted 0 times
...
Delisa
17 days ago
I practiced a similar question, and I think the answer is B) Piggybacking because it involves unauthorized access to a network.
upvoted 0 times
...
Essie
22 days ago
I'm not entirely sure, but I feel like it could also be an evil twin attack if they somehow tricked Jane into connecting to a fake network.
upvoted 0 times
...
Sylvia
27 days ago
I remember studying about wireless security, and I think this might be piggybacking since Alice and John are using Jane's network without her permission.
upvoted 0 times
...

Save Cancel