How can he generate traffic on the network so that he can capture enough packets to crack the WEP key?
Which of the following steganography utilities exploits the nature of white space and allows the user to conceal information in these white spaces?