Rogue Access Points

From Glitchdata
Jump to navigation Jump to search

Access Point masquerading as legitimate access point. This is then used to capture data as a man-in-the-middle attack.

A rogue access point masquerades as a legitimate access point. The risk is that legitimate users may connect through this access point and have their traffic monitored.