Discussion Post: Wireless Hacking
• What tools do black hat hackers use to attack wireless traffic? 200 words minimum.
• What are some possible attacks against WPA encrypted traffic? 200 words minimum.
• What is the "evil twin" attack? 200 words minimum.
• How can you authenticate, authorize, and audit wireless traffic on a Windows Active Directory Network?
The response must include a reference list. Using Times New Roman 12 pnt font, double-space, one-inch margins, and APA style of writing and citations.