List of questions
Related questions
Question 338 - 312-50v12 discussion
in this attack, an adversary tricks a victim into reinstalling an already-in-use key. This is achieved by manipulating and replaying cryptographic handshake messages. When the victim reinstall the key, associated parameters such as the incremental transmit packet number and receive packet number are reset to their initial values. What is this attack called?
A.
Chop chop attack
B.
KRACK
C.
Evil twin
D.
Wardriving
Your answer:
0 comments
Sorted by
Leave a comment first