If a wireless network uses weak encryption (e.g., WEP), attackers can capture and analyze packets to extract sensitive data.
Packet sniffing (Option C):
Tools like Wireshark, Aircrack-ng, and Kismet capture network packets.
Attackers analyze captured traffic to decrypt WEP encryption or extract plaintext credentials.
[Reference: CompTIA PenTest+ PT0-003 Official Study Guide - "Wireless Network Attacks and Sniffing", Incorrect options:, Option A (Bluejacking): Sends unsolicited Bluetooth messages, not for network sniffing., Option B (SSID spoofing): Involves creating a fake access point, but does not analyze traffic., Option D (ARP poisoning): Used for MITM attacks, but not specific to wireless traffic analysis., ]
Submit