Stealth and Evasion in Rogue AP Attacks: An Analysis of Modern Detection and Bypass Techniques
By: Kaleb Bacztub , Braden Vester , Matteo Hodge and more
Potential Business Impact:
Hackers trick phones, but security software misses it.
Wireless networks act as the backbone of modern digital connectivity, making them a primary target for cyber adversaries. Rogue Access Point attacks, specifically the Evil Twin variant, enable attackers to clone legitimate wireless network identifiers to deceive users into connecting. Once a connection is established, the adversary can intercept traffic and harvest sensitive credentials. While modern defensive architectures often employ Network Intrusion Detection Systems (NIDS) to identify malicious activity, the effectiveness of these systems against Layer 2 wireless threats remains a subject of critical inquiry. This project aimed to design a stealth-capable Rogue AP and evaluate its detectability against Suricata, an open-source NIDS/IPS. The methodology initially focused on a hardware-based deployment using Raspberry Pi platforms but transitioned to a virtualized environment due to severe system compatibility issues. Using Wifipumpkin3, the research team successfully deployed a captive portal that harvested user credentials from connected devices. However, the Suricata NIDS failed to flag the attack, highlighting a significant blind spot in traditional intrusion detection regarding wireless management frame attacks. This paper details the construction of the attack, the evasion techniques employed, and the limitations of current NIDS solutions in detecting localized wireless threats
Similar Papers
StealthCup: Realistic, Multi-Stage, Evasion-Focused CTF for Benchmarking IDS
Cryptography and Security
Finds hidden computer attacks missed by security tools.
Investigation of Advanced Persistent Threats Network-based Tactics, Techniques and Procedures
Cryptography and Security
Finds hidden computer attacks using web traffic.
Lightweight CNN-Based Wi-Fi Intrusion Detection Using 2D Traffic Representations
Cryptography and Security
Finds Wi-Fi hackers using smart computer programs.