Depending on the amount of data to process, file generation may take longer.

If it takes too long to generate, you can limit the data by, for example, reducing the range of years.


Download BibTeX


Structure and Logic of the Evil Twin Attack in the context of Open Source Software


[ 1 ] Instytut Sieci Teleinformatycznych, Wydział Informatyki i Telekomunikacji, Politechnika Poznańska | [ 2 ] Wydział Informatyki i Telekomunikacji, Politechnika Poznańska | [ P ] employee | [ DW ] applied doctorate phd student | [ S ] student

Scientific discipline (Law 2.0)

[2.3] Information and communication technology

Year of publication


Chapter type

chapter in monograph / paper

Publication language


  • evil twin
  • wireless LAN
  • MITM (Man in the Middle)
  • WLAN Security

EN This article provides an analysis of an attack on wireless networks referred to as Evil Twin. In addition to a theoretical description, the article discusses the hardware and system combination used, while pointing out its relatively low complexity, and the complimentary nature of the solutions used, both the operating system and the software used are presented. This clearly translates into the potential when attempting to break through security and gain specific data. Furthermore, the authors present the individual phases of the attack, including the proposed subsequent optimisations, in order to make the attack practically applicable in most cases, regardless of the location and shape of the network under investigation. The paper additionally presents methods for tuning the functionality itself, in order to ultimately increase the probability of success of the attack itself. The article is the result of work devoted to reviewing the literature on the subject and conducting experiments with various scripts including their optimisation.

Pages (from - to)

163 - 170


Koszt publikacji: 1085,87 zł
Źródło: środki finansowe, o których mowa w art. 365 pkt 2 ustawy


Proceedings of the 41st International Business Information Management Association Computer Science Conference IBIMA, 26-27 June 2023, Granada, Spain. Theory and Practice in Modern Computing: From Artificial Intelligence to Computer Security

Presented on

41th International Business Information Management Association Conference IBIMA 2023, 26-27.06.2023, Granada, Spain

Ministry points / chapter


Ministry points / conference (CORE)


This website uses cookies to remember the authenticated session of the user. For more information, read about Cookies and Privacy Policy.