To hijack a wireless client, attackers often use:
An RF jamming device to disconnect the client from the legitimate AP (via deauth attacks or RF disruption)
A rogue AP (created using access point software) that impersonates the real network
DHCP server software to assign IP addresses and act as a gateway, completing the fake network
Incorrect:
B. Terminal emulation is not relevant.
C. Workgroup bridges and protocol analyzers are for monitoring, not attacking.
E. MAC spoofing and DoS do not complete a hijack.
[References:, , CWSP-208 Study Guide, Chapter 5 (Hijacking Tools and Techniques), , CWNP Practical WLAN Attack Tools Guide, ]
Submit