linuxsecurityblog.com
The Evil Twin Attack
I searched through many guides, and none of them really gave good description of how to do this. There’s a lot of software out there (such as SEToolkit, which can automate this for you), but I deci…