A security administrator is using a software program to test the security of a wireless access point. After running the program for a few hours, the access point
sends the wireless secret key back to the software program.
Which of the following attacks is this an example of?
A.
WPS
B.
IV
C.
Deauth
D.
Replay
Explanation:
Deauth attack sends disassocate packets to one or more clients which are currently associated with a particular access point. Disassociating clients
can be done for a number of reasons:
Recovering a hidden ESSID. This is an ESSID which is not being broadcast. Another term for this is “cloaked”.
Capturing WPA/WPA2 handshakes by forcing clients to reauthenticate Generate ARP requests (Windows clients sometimes flush their ARP cache when
disconnected)