First page Back Continue Last page Image

The Rogue Access Point

With a Rogue Access Point a malacious user sets up their own access point that Legitimate users mistake as a legitimate access point

The Rogue user can now monitor all the traffic

The Rogue point will even use the same SSID as the legitimate Access points