<s>
An	O
evil	B-Protocol
twin	I-Protocol
is	O
a	O
fraudulent	O
Wi-Fi	B-Device
access	I-Device
point	I-Device
that	O
appears	O
to	O
be	O
legitimate	O
but	O
is	O
set	O
up	O
to	O
eavesdrop	O
on	O
wireless	O
communications	O
.	O
</s>
<s>
The	O
evil	B-Protocol
twin	I-Protocol
is	O
the	O
wireless	B-Architecture
LAN	I-Architecture
equivalent	O
of	O
the	O
phishing	O
scam	O
.	O
</s>
<s>
The	O
attacker	O
snoops	O
on	O
Internet	O
traffic	O
using	O
a	O
bogus	O
wireless	B-Device
access	I-Device
point	I-Device
.	O
</s>
<s>
Unwitting	O
web	O
users	O
may	O
be	O
invited	O
to	O
log	O
into	O
the	O
attacker	O
's	O
server	B-Application
,	O
prompting	O
them	O
to	O
enter	O
sensitive	O
information	O
such	O
as	O
usernames	O
and	O
passwords	O
.	O
</s>
<s>
When	O
users	O
log	O
into	O
unsecured	O
(	O
non-HTTPS	O
)	O
bank	O
or	O
e-mail	O
accounts	O
,	O
the	O
attacker	O
intercepts	O
the	O
transaction	O
,	O
since	O
it	O
is	O
sent	O
through	O
their	O
equipment	O
.	O
</s>
<s>
Fake	O
access	O
points	O
are	O
set	O
up	O
by	O
configuring	O
a	O
wireless	O
card	O
to	O
act	O
as	O
an	O
access	O
point	O
(	O
known	O
as	O
HostAP	B-Application
)	O
.	O
</s>
<s>
The	O
evil	B-Protocol
twin	I-Protocol
can	O
be	O
configured	O
to	O
pass	O
Internet	O
traffic	O
through	O
to	O
the	O
legitimate	O
access	O
point	O
while	O
monitoring	O
the	O
victim	O
's	O
connection	O
,	O
or	O
it	O
can	O
simply	O
say	O
the	O
system	O
is	O
temporarily	O
unavailable	O
after	O
obtaining	O
a	O
username	O
and	O
password	O
.	O
</s>
<s>
One	O
of	O
the	O
most	O
commonly	O
used	O
attacks	O
under	O
evil	B-Protocol
twins	I-Protocol
is	O
a	O
captive	O
portal	O
.	O
</s>
<s>
At	O
first	O
,	O
the	O
attacker	O
would	O
create	O
a	O
fake	O
wireless	B-Device
access	I-Device
point	I-Device
that	O
has	O
a	O
similar	O
Essid	O
to	O
the	O
legitimate	O
access	O
point	O
.	O
</s>
