This is a dedicated watch page for a single video.
Jimmy, a penetration tester, is conducting a wireless security assessment for a corporate office. He sets up a rogue access point with the same SSID as the legitimate office Wi-Fi. Unsuspecting employees connect to it, thinking it's the real network, allowing Jimmy to intercept their credentials and network traffic. What type of attack is Jimmy performing?