In this lecture we will discuss the idea of an evil twin attack, and how it can be used to get the WPA/WPA2 key.