It then directs a denial of service (DOS) attack against the legitimate WiFi access point, or creates RF interference around it that disconnects wireless users of the connection and prompts users to inspect available networks. Same as Evil Twin, the tool first creates a phony wireless Access Point (AP) masquerade itself as the legitimate WiFi AP. WiFi-Phisher tool uses “Evil Twin” attack scenario.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |