List of questions
Related questions
Question 212 - PT0-002 discussion
A penetration tester opened a shell on a laptop at a client's office but is unable to pivot because of restrictive ACLs on the wireless subnet. The tester is also aware that all laptop users have a hardwired connection available at their desks. Which of the following is the BEST method available to pivot and gain additional access to the network?
A.
Set up a captive portal with embedded malicious code.
B.
Capture handshakes from wireless clients to crack.
C.
Span deauthentication packets to the wireless clients.
D.
Set up another access point and perform an evil twin attack.
Your answer:
0 comments
Sorted by
Leave a comment first