Rogue Access Points
Jump to navigation Jump to search
Access Point masquerading as legitimate access point. This is then used to capture data as a man-in-the-middle attack.
A rogue access point masquerades as a legitimate access point. The risk is that legitimate users may connect through this access point and have their traffic monitored.