his inbred neighbor of mine is doing a twin (spoof) of my WiFi. everytime I look at Putlocker films or Porno sites he's up there moving around. especially when I porn. it's like he walks super hard or beating off
it's super creepy. I'm very certain they are the ones who posted NIGGASIN*SPACE in the WiFi SSID
source
https://www.okta.com/identity-101/evil-twin-attack/WiFi Pineapple
Evil twin attacks, step by step
Hackers need impatient web users to pull off an evil twin attack. Unfortunately, plenty of us fall into this category. When we go into a public space, such as a library or a coffee shop, we expect that establishment to offer free and fast WiFi. In fact, reporters even rank businesses by their connection speeds.
But that speed and convenience come with a cost. Hackers can quickly take over a safe-seeming WiFi connection and see (or steal) anything users do online.
An attack typically works like this:
Step 1: Set up an evil twin access point.
A hacker looks for a location with free, popular WiFi. The hacker takes note of the Service Set Identifier (SSID) name. Then, the hacker uses a tool like a WiFi Pineapple to set up a new account with the same SSID. Connected devices can't differentiate between legitimate connections and fake versions.
Step 2: Set up a fake captive portal.
Before you can sign in to most public WiFi accounts, you must fill in data on a generic login page. A hacker will set up an exact copy of this page, hoping that they will trick the victim into offering up authentication details. Once the hacker has those, they can log in to the network and control it.
Step 3: Encourage victims to connect to the evil twin WiFi.
The hacker moves close to victims and makes a stronger connection signal than the valid version. Anyone new will only see the evil twin, and they will tap and log in. The hacker can kick off anyone currently connected with a distributed denial of service (DDoS) attack, which temporarily takes the valid server offline and prompts mass logins.
Step 4: The hacker steals the data.
Anyone who logs in connects via the hacker. This is a classic man-in-the-middle attack, which allows the attacker to monitor anything that happens online. If the user logs into something sensitive (like a bank account), the hacker can see all the login details and save them for later use.
Customer participation is critical in an evil twin WiFi attack. And unfortunately, only about half of all consumers think they're responsible for securing their data on a public WiFi account. Most think the companies that offer connections will protect them. The companies may disagree.
So creepy and Gay. just this smug faces when I see him. he also looks at his electric meter too. uppity. listens to decent music though
prolly a former NirvanaNet guy
Evil Attack Type II
Evil twin attacks: 2 examples
Why would someone want to sit between customers and websites? Let's walk through two examples of how hackers might use data like this.
Let's imagine a hacker sitting inside a connection at a local coffee shop:
The setup is successful. The hacker has created an evil twin network, and one person logs in.
The attack begins. The victim has no idea that the connection is not secure. They head to a banking page and log in. They then agree to transfer $100 to a friend.
The hacker transforms the data. The hacker intercepts the request and changes the recipient to an account that they own. The bank processes the transaction and sends a receipt. The hacker changes that receipt, so the victim thinks the back just completed the original work.
Let's imagine another version of this same attack.
The setup is successful. The hacker has created an evil twin network, along with a phishing site.
The connection initiates. The victim must log in to this phishing site to gain access. The person might believe they're logging into a common site, like Facebook or Google. But instead, they're connecting with a hacker.
The hacker steals the target data. The hacker can see the victim's login data and save it. The hacker can use that login to steal funds, or the hacker can sell credentials to buyers on the black market.
The hacker releases the victim. The hacker disconnects the victim. The next login is valid, and the victim has no idea anything went wrong.
An attack like this can be remarkably profitable. And it's almost impossible for victims to spot the problems as they unfold.