This guide is currently under development, and I greatly welcome any suggestions or feedback or at reaper.gitbook@gmail.com

Rogue Access Point

A malicious controlled AP that mimics an existing approved AP. Ideally, we must be positioned closer to the rogue AP than the real AP. this attack will be used to grab WPA Pre-shared keys.

Last updated

Was this helpful?