A company hires a penetration tester to test the security of its wireless networks. The main goal is to intercept and access sensitive data.
Which of the following tools should the security professional use to best accomplish this task?
Metasploit
WiFi-Pumpkin
SET
theHarvester
WiGLE.net
WiFi-Pumpkin is used for man-in-the-middle (MitM) attacks on Wi-Fi networks, making it ideal for intercepting and accessing data.
Option A (Metasploit) ❌: Good for exploitation, but not specialized for Wi-Fi attacks.
Option B (WiFi-Pumpkin) ✅: Correct.
Creates fake Wi-Fi access points.
Intercepts network traffic (SSL stripping, DNS spoofing).
Option C (SET - Social Engineering Toolkit) ❌: Focuses on phishing, not Wi-Fi attacks.
Option D (theHarvester) ❌: Used for OSINT, not Wi-Fi exploitation.
Option E (WiGLE.net) ❌: Maps Wi-Fi networks, but does not capture sensitive data.
???? Reference: CompTIA PenTest+ PT0-003 Official Guide – Wireless Attacks & Fake APs
Submit