Results 1 to 2 of 2

Thread: Type of attack I'm thinking of?

  1. #1
    Join Date
    2013-Jul
    Location
    United States
    Posts
    520

    Type of attack I'm thinking of?

    So I had an idea pop into my head about a type of WPA/WPA2 attack. I don't know if it already exists (because I don't know what it's called) but I believe it does. So in this situation, we have an AP with WPA or WPA2 with one or more clients. The attacker then creates a rouge? (correct me if that term is wrong) AP with the same SSID, bssid, channel, etc while also deauthing the target network. The clients are then forced to connect to the rouge? AP and input the WPA/WPA2 password. The password is then logged and you now have the password. I think it's a MITM attack but it seems to easy to exist. So does it? And if it does, is there a tool for it? Thanks for all your help! (I would've searched for it but I don't know what it would be called.

  2. #2
    Join Date
    2013-Jul
    Location
    United States
    Posts
    520
    Never mind. After a lot of searching around, the I found that the key will still be encrypted. The closest method to this that I can find is the evil twin method. Of course it has it's downfalls but it's better than nothing!

Similar Threads

  1. WPS Pixie Dust Attack (Offline WPS Attack)
    By soxrok2212 in forum General Archive
    Replies: 353
    Last Post: 2015-05-05, 08:32
  2. Replies: 0
    Last Post: 2014-02-05, 20:33

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •