During a wireless penetration test, a tester detects an access point using WPA2 encryption. Which of the following attacks should be used to obtain the key?
A.
The tester must capture the WPA2 authentication handshake and then crack it.
B.
The tester must use the tool inSSIDer to crack it using the ESSID of the network.
C.
The tester cannot crack WPA2 because it is in full compliance with the IEEE 802.11i standard.
D.
The tester must change the MAC address of the wireless network card and then use the AirTraf tool to obtain the key.
Sniffing 4-way handshake
• 4-way handshake is the ceremony between AP and the device
• Vulnerability in WPA and WPA-Personal (WPA-PSK, pre-shared key)
• During WPA handshake, password is shared in encrypted form (called PMK (pairwise master key))
upvoted 1 times
...
This section is not available anymore. Please use the main Exam Page.312-50 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Hemanshu87
10 months, 3 weeks ago