Q: 6
[Attacks and Exploits]
A penetration tester aims to exploit a vulnerability in a wireless network that lacks proper
encryption. The lack of proper encryption allows malicious content to infiltrate the network. Which
of the following techniques would most likely achieve the goal?
Options
Discussion
Its A, had something like this in a mock and packet injection was correct.
B
D
It’s A. Packet injection actually lets you craft and send data to a WiFi network especially if encryption is weak or missing. B is tempting but bluejacking only works with Bluetooth so it’s not really for WiFi attacks. Open to pushback here.
A tbh
Honestly I'd pick B. Bluejacking is about sending unsolicited messages, so seems relevant for wireless vulnerabilities here.
B or A honestly. Bluejacking seems tempting since it's about injecting messages, but pretty sure that's only for Bluetooth devices, not WiFi. Still, bluejacking does exploit weak protections in wireless. I could see someone picking B if they miss the difference. Not 100% on this one.
Its A. No encryption lets you inject packets directly into the traffic, which lines up with the scenario about infiltration. Jamming (D) just knocks out connectivity, and bluejacking is Bluetooth not WiFi. Pretty sure packet injection is what they want, but open to being wrong if someone has a different angle.
A imo, saw almost identical scenario in a practice set and it matched packet injection.
Why does B keep coming up? Bluejacking is only for Bluetooth, not WiFi.
Be respectful. No spam.