Very simple article to explain how to setup a man in the middle situation using a rogue WiFi access point.
This site is about IT security. Here we present the authors articles and security tools. This site is cooperative, feel free to comment and criticize any article/application. If you want to publish your articles and/or applications on this site, send a request to contact[at]sevagas.com.
You can send us encrypted messages using our GPG public key.