Rogue Access Point (Rogue AP)
Advertisement
Techopedia Explains Rogue Access Point (Rogue AP)
Another, and perhaps more common, example of a rogue access point is what is sometimes referred to as an "evil twin." This, at no time, involves unauthorized Ethernet connections as in the example above. Rather, this involves a wireless device just outside of an organization that receives beacons transmitted by legitimate access points within the organization. The evil twin then begins to transmit identical beacons with the intent of having end users within the organization connect with it. Once connected, the evil twin can then be used by nefarious individuals as an avenue into the organization's network.Advertisement
Related Reading
- BackTrack Linux: Penetration Testing Made Easy
- Top 3 Wi-Fi Security Vulnerabilities
- How to Set Up a Static IP Address
- AI in the Enterprise: 3 Key Application Areas
- 5 Ways AI is Changing Art
- AI's Got Some Explaining to Do