Jane invites her friends Alice and John over for a LAN party. Alice and John access Jane’s wireless network without a password. However, Jane has a long, complex password on her router. What attack has likely occurred?
A. Wardriving – This involves driving around and scanning for open or vulnerable Wi-Fi networks, but there’s no indication that Alice and John had to search for the network.
B. Wireless sniffing – This refers to intercepting wireless communications using packet sniffers, which is not what happened here.
C. Evil twin – This is when an attacker sets up a rogue Wi-Fi network that mimics a legitimate one to trick users into connecting, but there’s no mention of a fake network in this scenario.
Since Alice and John accessed the network without explicit permission but without any hacking technique being described, piggybacking is the most appropriate answer.
C is correct - Evil Twin.
Alice and John aren't meant to be hackers here, they are victims. The hacker set up rogue AP with Open Authentication (without password) with the same SSID as legitimate AP.
This is the attack.
Piggybacking = entering restricted area (like office) - an AUTHORIZED person KNOWINGLY allows an unauthorized person to enter a secure area.
Can be due to negligence, deception, or social engineering.
Piggybacking is similar to Tailgating = also entering restricted area but WITHOUT KNOWLEDGE of aughorized person (for ex. following someone authorized while door is closing).
In this case, since Alice and John accessed the network without a password, it suggests that they connected to a fake access point that was created to look like Jane's legitimate network. This rogue access point could be controlled by an attacker, allowing unauthorized users to connect without needing the real password.
The correct answer is:
D. Piggybacking
Explanation:
Piggybacking occurs when an unauthorized user gains access to a secure network without the owner’s permission.
In this case, Alice and John accessed Jane’s wireless network without needing a password, meaning they might have exploited an open connection or used saved credentials without Jane’s consent.
Why not the other options?
A. Wardriving → Involves driving around and scanning for vulnerable Wi-Fi networks. Jane’s case is a home LAN party, not an external attack.
B. Wireless sniffing → Capturing data packets over a network to analyze them. Alice and John are just connecting, not intercepting data.
C. Evil twin → Setting up a rogue Wi-Fi hotspot that mimics a legitimate network to steal data. Jane’s network is legitimate, so this is not an evil twin attack.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
mulekule
3 weeks, 5 days agobibibi
2 months, 1 week agoakrpsn
2 months, 4 weeks agoNikoTomas
1 month, 3 weeks agoDogeo
2 months, 4 weeks agoHazalAlenazi
3 months ago