Attacker simulate as a fake access point and make a deauthenticate attack to make client connected to Fake AP which attacker can steal credentials using fake pages
image.png
Second Way (Evil Twin)
How attack work ?
Tools
Mana toolkit used to create a fake access point was connected to internet because in kali we connecting to NAT Network
MITM Proxy → sniff all traffic including passwords and usernames