A rogue peer is an end-user computer-usually a laptop
-that has both bridging and wireless
enabled. Since the basic functions of an access point
and wireless access, any laptop that has these capabilities presents a similar vulnerability or worse. The vulnerability with a rogue peer can be much more severe than with a rogue AP
, because laptops provide almost no security features to prevent connections from other unauthorized users.
A rogue peer is one of two categories of rogue wireless devices, with the other being rogue access points.