คุณได้ทำวิทยานิพนธ์ในโปรแกรมe-thesis2) Attacker’s external rogue access point: The rogue
access point is setup outside the company and
does not connect to the company’s network.
Typically the attacker will use the high
transmission power and high antenna gain rogue
access point with the spoof SSID. It aims to allure
the target employee to connect the rogue access
point. All user traffic is redirected through the
rogue access point and analyzed by the attacker.
This attack is called Man-in-the-middle-Attack.