GIAC Systems and Network Auditor
Question No. 1
Mark is an attacker. He wants to discover wireless LANs by listening to beacons or sending probe requests and thereby provide a launch point for further attacks.
Which of the following tools can he use to accomplish the task?
Choose all the correct options from the given list.
01 / 370