List of questions
Related questions
Question 559 - 312-50v12 discussion
During a red team engagement, an ethical hacker is tasked with testing the security measures of an organization's wireless network. The hacker needs to select an appropriate tool to carry out a session hijacking attack. Which of the following tools should the hacker use to effectively perform session hijacking and subsequent security analysis, given that the target wireless network has the Wi-Fi Protected Access-preshared key (WPA-PSK) security protocol in place?
A.
FaceNiff
B.
Hetty
C.
Droidsheep
D.
bettercap
Your answer:
0 comments
Sorted by
Leave a comment first