In: Other
An attacker is attempting to gain unauthorized access to a WiR network that uses WPA2-PSK. Which of the following attack vectors would the attacker MOST likely use?
Capture a three-way handshake and crack it.
Capture a mobile device and crack its encryption.
Create a rogue wireless access point.
Capture a four-way handshake and crack it.
Capture a four-way handshake and crack it.
The Most likely use is Capture a four-way handshake and crack it, For WPA2, it starts with a Four way handshake connection. Where the attack is mostly possible. How it happens is all the devices which are connected to the network
Those devices will be retransmit and the network will send the Four way handshake to connect to the device, where the attacker will get the handshake and the attacker will decrypt the password