2Mar
Whats the difference between an evil twin and a rogue access point?
I'm having a hard time understanding the difference between a rogue AP and an evil twin. I've spent some time searching for it, but I don't think I understand it fully.
Is the AP a device that needs to be physically plugged in (Ethernet cable and port) to a existing network, and the evil twin can be a computer or Raspberry Pi that only uses Wi-Fi to connect to its victim and a legitimate AP? Is this somewhat correct or have I misunderstood it?