Which of the following types of attacks is Paola performing in the above scenario?
Paola, a professional hacker, configured her wireless router in an organization’s premises and advertised it with a spoofed SSID. She lured victims to connect to the router by sending the fake SSID. She started sniffing all the traffic from the victims that is passing through his wireless router.
Which of the following types of attacks is Paola performing in the above scenario?
A . Key reinstallation attack
B . Ad-hoc connection attack
C . Rogue AP attack
D . AP MAC spoofing attack
Answer: C
Explanation:
In the given scenario, Paola has set up a rogue wireless access point (AP) with a spoofed SSID. This rogue AP appears legitimate to victims, who unknowingly connect to it. Once connected, Paola can intercept and sniff all the network traffic passing through her rogue AP. This type of attack is known as a Rogue AP attack.
Reference: EC-Council Certified Security Specialist (E|CSS) course materials and study guide12.
Latest ECSS Dumps Valid Version with 100 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund