An analyst is developing a proof of concept of a wireless-based attack as part of a penetration test against an organization-s network. As part of the attack, the analyst launches
a fake access point matching the SSID of the organization-s guest access network. When a user connects to the fake access point, the analyst allows the traffic to flow through the access point to the legitimate site while the data traversing the network i
s logged for latest analysis and exploitation. Which of the following attacks has the analyst successfully performed in this scenario?
B. Session hijacking
C. MAC spoofing
D. VLAN hopping