Exam PT0-002 All QuestionsBrowse all questions from this exam
Question 164

A penetration tester is assessing a wireless network. Although monitoring the correct channel and SSID, the tester is unable to capture a handshake between the clients and the AP. Which of the following attacks is the MOST effective to allow the penetration tester to capture a handshake?

    Correct Answer: B

    A deauthentication attack involves sending deauthentication frames to clients connected to the access point, forcing them to disconnect and reconnect. When clients reconnect, they go through the authentication process again, which includes the handshake. This allows the penetration tester to capture the handshake packets between the clients and the access point, making this the most effective method to achieve the goal.

Discussion
ronniehaangOption: B

Capturing handshakes is often part of a deauthentication attack. If you can capture handshakes, you can then attempt to crack the passphrase and derive keys from that effort.

ManzerOption: B

Deauth will make the client connect again.

nickwen007Option: B

The most effective attack to allow the penetration tester to capture a handshake would be B. Deauthentication. Deauthentication is an attack that involves sending deauthentication frames to force clients away from the access points they are currently connected to, allowing the tester to capture a handshake between the clients and the access point.

NeolotOption: B

i think B is correct answer for this.

kloug

bbbbbbb

Etc_Shadow28000Option: B

B. Deauthentication Explanation: • Deauthentication Attack: This attack involves sending deauthentication frames to clients connected to the AP, forcing them to disconnect and reconnect. When the clients reconnect, they go through the authentication process again, which includes the handshake. This allows the penetration tester to capture the handshake packets.

solutionzOption: B

Deauth will force client to reconnect thereby the ability to get handshake.