Another effective way to compromise or circumvent access control on a wireless network is to create what is known as a rogue access point. A rogue access point is simply a wireless access point that has been installed on a network without explicit permission or authorization from the owner or administrator of that network. In practice, a rogue access point can be put in place by a well-intentioned employee, or even a malicious party such as a disgruntled employee, or in an intruder.
An access point can come in one of two forms: it can be either a soft access point or some form of hard access point.
A soft access point is an access point that is created through software such as the types we have in Kali as well as other third-party applications. It can even be argued that the software present on smartphones creates a soft access point out of the smartphone...