Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

An attacker is trying to compromise a wireless network that has been secured using WPA 2 - PSK and AES. She first tried using AirSnort

An attacker is trying to compromise a wireless network that has been secured using WPA2-PSK and AES. She first tried using AirSnort to capture packets, but found that she couldn't break the encryption.
As an alternative, she used software to configure her laptop to function as an access point. She configured the fake access point with the same SSID as the wireless network she is trying to break into. When wireless clients connect to her access point, she presents them with a web page that asks them to enter the WPA2 passphrase. When they do, she uses the password to connect a wireless client to the real access point.
Which attack techniques did the attacker use in this scenario? (Select two.)
answer
Man-in-the-middle
Pharming
Smurf
Denial of service
Evil twin

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Oracle RMAN For Absolute Beginners

Authors: Darl Kuhn

1st Edition

1484207637, 9781484207635

More Books

Students also viewed these Databases questions