Answered step by step
Verified Expert Solution
Question
1 Approved Answer
An attacker is trying to compromise a wireless network that has been secured using WPA 2 - PSK and AES. She first tried using AirSnort
An attacker is trying to compromise a wireless network that has been secured using WPAPSK and AES. She first tried using AirSnort to capture packets, but found that she couldn't break the encryption.
As an alternative, she used software to configure her laptop to function as an access point. She configured the fake access point with the same SSID as the wireless network she is trying to break into. When wireless clients connect to her access point, she presents them with a web page that asks them to enter the WPA passphrase. When they do she uses the password to connect a wireless client to the real access point.
Which attack techniques did the attacker use in this scenario? Select two.
answer
Maninthemiddle
Pharming
Smurf
Denial of service
Evil twin
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started