Drew has been contracted to review wireless security. She has deployed a malicious wireless AP that mimics the configuration of the target enterprise WiFi. She now wants to try to force nearby wireless stations to connect to the malicious AP. Which of the following steps should she take NEXT?
The correct answer is B) Send deauthentication frames to the stations.
Send deauthentication frames to the stations: To force nearby wireless stations to disconnect from the legitimate AP and connect to the malicious AP, Drew can send deauthentication frames to the wireless stations. These frames are part of the 802.11 Wi-Fi standard and can be used to forcibly disconnect a device from an AP. Once the device is disconnected, it may automatically attempt to reconnect to the strongest available AP, which in this case would be the malicious AP. This is a common technique for carrying out a Man-in-the-Middle (MitM) attack or for capturing credentials.
Why the others are incorrect:
Set the malicious AP to broadcast within dynamic frequency selection channels: Dynamic Frequency Selection (DFS) is used to avoid interference with radar systems by selecting frequencies within the 5GHz band. While using DFS channels might allow the malicious AP to operate on channels that are less crowded, it won't directly force stations to connect to it. It could actually reduce the chances of station connection if stations are set to avoid DFS channels, depending on their configuration.
Modify the malicious AP configuration to not use a pre-shared key: Modifying the malicious AP to not use a pre-shared key would make it an open network, which might encourage some devices to connect, but this does not guarantee that stations will automatically connect to it. Many enterprise devices use WPA2 or WPA3 security, and simply removing the pre-shared key might not be enough to attract all devices, especially if they are configured to connect to secure networks.
Perform jamming on all 2.4GHz and 5GHz channels: Jamming involves sending noise signals on the same channels as the wireless network to disrupt communications, but it is not necessary for this specific attack. The deauthentication frames are more targeted and effective at causing the devices to disconnect and then reconnect to the malicious AP.
No Payment Cards Needed
Discover a range of courses designed to provide you with the knowledge and skills needed to excel in your chosen field.
You don’t need one month to study and pass your test.
With Prepsaret, it takes you a few days to grasp all the concepts needed to pass your exams