Discussion Post: Wireless Hacking
i. What tools do black hat hackers use to attack wireless traffic? 200 words minimum.
ii. What are some possible attacks against WPA encrypted traffic? 200 words minimum.
iii. What is the "evil twin" attack? 200 words minimum.
iv. How can you authenticate, authorize, and audit wireless traffic on a Windows Active Directory Network? Detail the actual setup. 500 words minimum.
The response must include a reference list. One-inch margins, double-space, Using Times New Roman 12 pnt font and APA style of writing and citations.