Question Evil twin Access point and MITM

Please provide comments and solutions that are helpful to the author of this topic.

marksti64

Level 2
Thread author
Sep 13, 2022
52
295
65
Hungary
At school we did a kahoot test and there was a question that was: "What kind of an attack is an Evil Twin router?". There was 4 answers and later I found out that the good answer was Man-in-The-Middle, and I don't understand why. I tried to discuss it with my teacher but he doesn't know if the answer is correct or not. All I could think about that maybe the attacker is using a de-auth attack too and that's why, but I'm not sure.
Is the answer correct and can I get an explanation of the answer? Thank you in advance!
 
Yes, the answer "Man-in-The-Middle" is correct. Here's why:

An Evil Twin attack creates a fake wireless access point that appears to be a legitimate one. When people connect to it, the attacker can intercept and manipulate their data traffic, leading to many consequences such as identity theft or data breaches.

The attack is called "Man-in-The-Middle" because the attacker is positioned between the victim and the actual access point, which allows them to intercept all traffic and look like they are a legitimate participant in the communication exchange. Essentially, the attacker is able to see and modify everything that passes through the fake access point thanks to the MITM technique.

So, in short, an Evil Twin router attack is a type of Man-in-The-Middle attack.