03 ~ Attacking ~ Detection Diagrams - SYWorks/wireless-ids GitHub Wiki

Diagram of Hacking/Detection Process

Diagram1

Step-by-step Attacking/Detection diagram

  • Attacker setting up his fake access point similar to victim’s AP name attack1

  • WIDS detected Evil Twins detect1

  • Attacker sent deauthentication to client & Access Point attack2

  • WIDS detected Deauth flooding. detect2

  • Victim carelessly connected to the fake access point set by attacker attack3

  • Change in connection from one access point to another detect3


Support & Like My Page SYWorks


Prev Page......Next Page