Attackers are also able to gain enterprise information by
setting up Honeypot APs with misleading SSIDs. In some
occasions, the attackers might mimic legitimate APs by forging
the SSIDs and MAC addresses. Then the attackers can watch a
number of clients unconsciously login to the malicious AP with
their authentication information. Some OSs that cannot identify
the fake APs might even automatically attempt to associate
with them. By recording the authentication information during
the login or association, the attackers is able to gain the
necessary information that can be used to access to the
enterprise wireless network