Rouge Access Point
First Way (open Wi-Fi)
Attacker simulate as a fake access point and make a deauthenticate attack
to make client connected to Fake AP which attacker can steal credentials using fake pages

Second Way (Evil Twin)

How attack work ?

Tools
Mana toolkit
used to create a fake access point was connected to internet because in kali we connecting to NAT Network
MITM Proxy
→ sniff all traffic including passwords and usernames

Last updated