The type of attack is Zariah describing is evil twin. A rogue Wi-Fi access point (AP) that poses as a genuine one and provides access to sensitive data without the end user's knowledge is known as a "evil twin assault."
With a smartphone or other internet-capable gadget, some readily available software, and an attacker, it is simple to construct an evil twin. A fake Wi-Fi access point called a "evil twin" is put up to eavesdrop on wireless conversations even if it appears to be authentic. The wireless LAN version of the phishing scam is called the evil twin.
Using phishing, which includes creating a fake website and tricking people into visiting it, or by monitoring connections, this type of attack can be used to acquire the credentials of unwary users.
Using a fake wireless access point, the attacker monitors Internet traffic. Unintentional website visitors may receive an invitation to log into the attacker's server, which would compel them to provide sensitive data such usernames and passwords. Users frequently don't realize they've been tricked until after the occurrence has already happened.
To know more about evil twin click on the link:
https://brainly.com/question/13944835
#SPJ4