EC-Council Certified Security Analyst
Question No. 1
Steven is performing a wireless network audit. As part of the engagement, he is trying to crack a WPA-PSK key. Steven has captured enough packets to run aircrack-ng and discover the key, but aircrack-ng did not yield any result, as there were no authentication packets in the capture.Which of the following commands should Steven use to generate authentication packets?
Choose the correct option from the given list.
01 / 150