header bg

Scan QR code or get instant email to install app

Question:

As part of a penetration test against an organization’s network, an analyst is building up evidence of the concept of a wireless‐based attack. As part of the attack, the analyst launches a fake connection point fitting with the SSID of the organization’s guest access network. When a user accesses the fake access point, the analyst permits the traffic to flow through the access point to the legitimate site while the data traversing the network is logged for the latest analysis and exploitation.
Which attack has the analyst successfully performed in this case?

A Man‐in‐the‐middle
explanation

Related Information

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

*