When investigating a wireless attack, what information can be obtained from the DHCP logs?
The operating system of the attacker and victim computersThe operating system of the attacker and victim? computers
IP traffic between the attacker and the victim
MAC address of the attacker
If any computers on the network are running in promiscuous mode
Submit