How easy would it be for a bad guy to pose as a legitimate wireless network? In this video, you’ll learn how rogue access points and evil twins can be used to infiltrate legitimate wireless networks.
<< Previous Video: Cracking WEP and WPANext: Denial of Service Attacks >>