http://www.cyber-51.com demonstrates how to get a user to connect to a fake Access Point and capture all activities of that user.
This video is made for educational purposes only. It is intended for those who wish to learn about, and protect themselves, from vulnerabilities and exploits used by malicious hackers. Accessing anyone else’s computer system without their consent is illegal! We do not condone or approve any illegal use of this tutorial in any way.