A penetration tester deploys a rogue AP in the target wireless infrastructure. What is the first step that has to be taken to force wireless clients to connect to the rogue AP?
- send out false DNS beacons
- spoof the MAC address of the rogue AP
- set the PSK key to match the clients
- send de-authentication frames to the clients
Explanation & Hints:
An attacker can cause legitimate wireless clients to deauthenticate from legitimate wireless APs or wireless routers to try to make those clients connect to the rogue AP by reassociating.
|