During a red team engagement, an ethical hacker is tasked with testing the security measures of an organization's wireless network. The hacker needs to select an appropriate tool to carry out a session hijacking attack. Which of the following tools should the hacker use to effectively perform session hijacking and subsequent security analysis, given that the target wireless network has the Wi-Fi Protected Access-pre-shared key (WPA-PSK) security protocol in place? A. Hetty B. bettercap C. DroidSheep D. FaceNiff Correct Answer: D This question is in 312-50v12 exam For getting CEH Certificate
Please login or Register to submit your answer