First page Back Continue Last page Overview Graphics
Evil Twin
Variation on the “inverse wardriving”
Evil access point mimicks existing access point ESSID
Looking for specific networks
Not just for promiscuous workstations
Increased power can override legitimate access points
Evil twins can be more difficult to find than rogues
Shield from within, shield from without