Techopedia Explains Rogue Access Point (Rogue AP)
Another, and perhaps more common, example of a rogue access point is what is sometimes referred to as an "evil twin." This, at no time, involves unauthorized Ethernet connections as in the example above. Rather, this involves a wireless device just outside of an organization that receives beacons transmitted by legitimate access points within the organization. The evil twin then begins to transmit identical beacons with the intent of having end users within the organization connect with it. Once connected, the evil twin can then be used by nefarious individuals as an avenue into the organization's network.