The first type of attack that can be used to attack confidentiality is known as the evil twin attack, or evil twin AP. This type of attack is generally not an attack that is used as a standalone, but rather used in conjunction with other attacks, as we will see.
The most common name for the type of attack we are mentioning here tends to be the evil twin moniker. However, do not be surprised to hear names such as rogue access point, shadow access point, wireless honeypot, as well as many other potential names. No matter what you call it, if you understand the mechanics of what is happening in this attack, you'll be fine no matter what name it goes by.
An evil twin attack takes place when a rogue access point is configured in a way that is identical to a legitimate access point and placed in close proximity. To the outside world and users, an evil twin...