A corporate wireless guest network uses an open SSID with a captive portal to authenticate guest users.
Guests can obtain their portal password at the service desk. A security consultant alerts the administrator that
the captive portal is easily bypassed, as long as one other wireless guest user is on the network. Which of the
following attacks did the security consultant use?
DNS cache poisoning
Rouge DHCP server