An evil twin attack involves setting up a rogue wireless access point that mimics a legitimate one. This type of attack can be highly effective in a penetration testing scenario because it can intercept and capture data transmitted over the network without causing noticeable interruptions to the normal operation of the wireless network. Users are tricked into connecting to the evil twin instead of the legitimate access point, allowing the penetration testers to capture sensitive information. Unlike jamming, which disrupts the network, or bluejacking, which is limited to sending unsolicited messages, the evil twin can facilitate man-in-the-middle attacks seamlessly. References: * OWASP Wireless Evil Twin Attack * Kali Linux Evil Twin Tutorial