Using EVIL-AP
EVIL-AP was created to perform pen tests and assist network administrators in auditing network security. AP allows network engineers to hack their own network to identify vulnerabilities and implement mechanisms to strengthen the network against potential attackers.
The author of this device is not responsible for any damages caused.
The first method by which a hacker router can exploit users is by intercepting login credentials to major platforms like Google, Facebook, and Microsoft. When an unsuspecting user connects to a Wi-Fi network that lacks proper password protection, the hacker router can redirect them to a fake login page. This page appears identical to the legitimate Google login page (or any other targeted platform), prompting the user to enter their username and password.
How it works:
The second method involves the hacker router scanning surrounding networks and creating a clone of a legitimate Wi-Fi network. This cloned network is configured with the same SSID (network name) but without a password, making it easier for users to unknowingly connect to it. When users enter their usual network password, thinking they are logging into their own network, the hacker router captures the credentials.
How it works: