A penetration tester has been contracted to review wireless security. The tester has deployed a malicious wireless AP that mimics the configuration of the target enterprise WiFi. The penetration tester now wants to try to force nearby wireless stations to connect to the malicious AP.
Which of the following steps should the tester take NEXT?
RRabbit_111
Highly Voted 1 year, 3 months agoJayMus
1 year, 3 months agoryanzou
Highly Voted 1 year, 7 months agoAbdallaAM
Most Recent 5 months, 1 week agoKirby87
5 months, 2 weeks agoSkater_Grace
6 months, 4 weeks agosolutionz
9 months agonickwen007
1 year, 1 month agokloug
1 year, 2 months agoLino_Carbon
1 year, 6 months agoRightAsTain
1 year, 7 months agoPokok2021
1 year, 7 months ago