December 2017
Intermediate to advanced
216 pages
6h 2m
English
The first type of attack that can be used to attack confidentiality is known as the evil twin attack, or evil twin AP. This type of attack is generally not an attack that is used as a standalone, but rather used in conjunction with other attacks, as we will see.
An evil twin attack takes place when a rogue access point is configured ...
Read now
Unlock full access