1 00:00:00,360 --> 00:00:04,470 Welcome to this tutorial, our third, Demetri's evil twin method. 2 00:00:04,990 --> 00:00:14,160 Now, what is evil twin evil twin is a type of attack similar to websites spoofing and e-mail phishing. 3 00:00:15,240 --> 00:00:17,880 Here is how an evil twin attack works. 4 00:00:18,540 --> 00:00:27,450 A hacker said it's a service identifier or society to be the same as an access point at the local hotspot 5 00:00:27,450 --> 00:00:29,190 or corporate wireless network. 6 00:00:29,970 --> 00:00:37,710 The hacker disrupts or disable the legitimate access point by disconnecting it and directing our denial 7 00:00:37,710 --> 00:00:43,170 of service, attack against it or creating radiofrequency around it. 8 00:00:43,620 --> 00:00:49,650 Users lose their connections to the legitimate access point and reconnect to the evil queen, allowing 9 00:00:49,650 --> 00:00:52,890 the hacker to intercept all the traffic to that device. 10 00:00:54,110 --> 00:00:56,790 It is the best method among all the three. 11 00:00:57,930 --> 00:01:01,250 So this is the short explanation about evildoing method. 12 00:01:01,960 --> 00:01:03,450 That's it for this tutorial. 13 00:01:03,480 --> 00:01:05,010 See you in the practical session.