Which of the following techniques are used above?

After viewing wireless traffic, an attacker notices the following networks are being broadcasted by
local access points:
Corpnet
Coffeeshop
FreePublicWifi
Using this information the attacker spoofs a response to make nearby laptops connect back to a
malicious device. Which of the following techniques are used above? (Select TWO).

After viewing wireless traffic, an attacker notices the following networks are being broadcasted by
local access points:
Corpnet
Coffeeshop
FreePublicWifi
Using this information the attacker spoofs a response to make nearby laptops connect back to a
malicious device. Which of the following techniques are used above? (Select TWO).

A.
Blue snarfing

B.
Evil twin

C.
Packet sniffing

D.
War dialing

E.
Rogue access point



Leave a Reply 0

Your email address will not be published. Required fields are marked *

three × four =