An evil twin is a fake wireless access point set up by an attacker to imitate a real wireless access point. The evil twin looks identical to the real access point, so most users will not notice any difference when signing on. Evil twins are often used to setup MITM attacks against unsuspecting victims. Many hackers will set up cloned versions of real Wi-Fi access points and have the victim log into the fake access point through a cloned landing page. An unauthorized access point not controlled by the network admin is called a rogue access point. After the victim connects to the evil twin, they are redirected to a fake landing page prompting them for credentials. When the victim logs into the landing page, the attacker begins harvesting the victim's username and password. Attackers will also sometimes hide a payload within the Accept terms button on a fake Wi-Fi landing page.
Once the victim...