Wireless networks act as the backbone of modern digital connectivity, making them a primary target for cyber adversaries. Rogue Access Point attacks, specifically the Evil Twin variant, enable attackers to clone legitimate wireless network identifiers to deceive users into connecting. Once a connection is established, the adversary can intercept traffic and harvest sensitive credentials. While modern defensive architectures often employ Network Intrusion Detection Systems (NIDS) to identify malicious activity, the effectiveness of these systems against Layer 2 wireless threats remains a subject of critical inquiry. This project aimed to design a stealth-capable Rogue AP and evaluate its detectability against Suricata, an open-source NIDS/IPS. The methodology initially focused on a hardware-based deployment using Raspberry Pi platforms but transitioned to a virtualized environment due to severe system compatibility issues. Using Wifipumpkin3, the research team successfully deployed a captive portal that harvested user credentials from connected devices. However, the Suricata NIDS failed to flag the attack, highlighting a significant blind spot in traditional intrusion detection regarding wireless management frame attacks. This paper details the construction of the attack, the evasion techniques employed, and the limitations of current NIDS solutions in detecting localized wireless threats
翻译:无线网络作为现代数字连接的基础设施,已成为网络攻击者的主要目标。流氓接入点攻击,特别是其变种“邪恶双胞胎”,使攻击者能够克隆合法无线网络标识符,诱骗用户连接。一旦建立连接,攻击者即可截获流量并窃取敏感凭证。尽管现代防御架构通常采用网络入侵检测系统(NIDS)来识别恶意活动,但这些系统在应对第2层无线威胁方面的有效性仍是一个关键研究课题。本项目旨在设计一种具备隐蔽能力的流氓接入点,并评估其在开源NIDS/IPS系统Suricata下的可检测性。研究方法最初基于树莓派平台进行硬件部署,但由于严重的系统兼容性问题,最终转向虚拟化环境。研究团队利用Wifipumpkin3成功部署了捕获门户,从连接设备中获取用户凭证。然而,Suricata NIDS未能标记该攻击,这凸显了传统入侵检测系统在应对无线管理帧攻击方面存在显著盲区。本文详细阐述了攻击的构建过程、所采用的规避技术,以及当前NIDS解决方案在检测本地化无线威胁方面的局限性。