Evil Twin Access Point
1. The victim sends its authentication credentials to the evil twin.
2. The evil twin passes the credentials on to the legitimate access point.
3. The legitimate access point sends back a secret key.
4. The evil twin remembers the key, then sends it to the client.