Question: This is a tool the attacker would use to capture packets to use in a replay attack. A . IP config B . Ping C
This is a tool the attacker would use to capture packets to use in a replay attack.
A
IP config
B
Ping
C
Wireshark
D
WiFi Explorer
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
