Question: An attacker is trying to compromise a wireless network that has been secured using WPA 2 - PSK and AES. She first tried using AirSnort
An attacker is trying to compromise a wireless network that has been secured using WPAPSK and AES. She first tried using AirSnort to capture packets, but found that she couldn't break the encryption.
As an alternative, she used software to configure her laptop to function as an access point. She configured the fake access point with the same SSID as the wireless network she is trying to break into. When wireless clients connect to her access point, she presents them with a web page that asks them to enter the WPA passphrase. When they do she uses the password to connect a wireless client to the real access point.
Which attack techniques did the attacker use in this scenario? Select two.
answer
Maninthemiddle
Pharming
Smurf
Denial of service
Evil twin
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
