A penetration tester has been contracted to review wireless security. The tester has deployed a malicious wireless AP that mimics the configuration of the target enterprise WiFi. The penetration tester now wants to try to force nearby wireless stations to connect to the malicious AP. Which of the following steps should the tester take NEXT?
DrChats
Highly Voted 3 years, 5 months agoDavar39
3 years, 3 months agoBinarySoldier
Highly Voted 3 years, 5 months agotokhs
Most Recent 3 years, 1 month ago