Objective: Students learn to detect rogue access points (evil twins) that impersonate legitimate WiFi networks.
Book Connection: Z.R.A.K.: Signal — fake hotspot detection
Equipment Required
- 1x dedicated WiFi router (the "legitimate" AP) — any consumer router
- 1x second WiFi router or portable hotspot (the "evil twin")
- Android devices with Z.R.A.K. installed (1 per student or group)
- Isolated network — not connected to school infrastructure
Setup Instructions
- Configure the legitimate router with SSID
CafeWiFi-Lab, WPA2 security, a known password, and channel 6 - Connect the legitimate router to nothing (no internet uplink) — this is a closed lab network
- Configure the evil twin router with the same SSID
CafeWiFi-Labbut use WPA (not WPA2), set it on channel 1, and use a different MAC address (default is fine) - Place routers at different locations in the classroom
- Power on the legitimate router first. Wait 2 minutes. Then power on the evil twin
Student Exercise
- Open Z.R.A.K. in RECON mode, go to the WiFi tab
- Observe the list of nearby networks. Note that
CafeWiFi-Labappears twice - Switch to Advanced Mode. Compare the two entries: different BSSIDs (MAC addresses), different channels, different security types
- Open the Events tab — Z.R.A.K.'s evil twin detector should flag the duplicate SSID
- Use the signal strength readings to estimate which AP is closer
- Document findings: Which one is the rogue? What gave it away?
Expected Outcomes
- Students identify that two APs share the same SSID but differ in BSSID, channel, and security
- Students understand that an evil twin can look identical by name but differs in technical details
- Z.R.A.K. automatically flags the security mismatch as a potential evil twin
Discussion Points
- How would a real attacker make the evil twin harder to detect?
- Why does signal strength matter in identifying rogue APs?
- What should you do if you find an evil twin in a real cafe?