Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
As an ethical hacker, John is pen-testing his client's wifi. John has sniffed a victim's wireless parameters (Mac address, EESID/BSSID, channel numbers), and now he wants to send DEAUTH request to the victim with the spoofed source address of the client's AP. Which tool does he need to use for deauthentication?
aireplay-ng
airmon-ng
airdump-ng
aircrack-ng
For monitoring step, "airmon-ng" ,and for sending deauthenticatation, he needs to use "aireplay-ng". Reference : Ethical Hacking and Countermeasures v9 .Module14 .page 692 Edited: It's aireplay-ng, not airplay-ng.
aireplay-ng is a Linux command, aircrack-ng is a tool suite.
Edit_2: So the answer should be aircrack-ng then? Needs be changed if true
Edit_3: No it should not be the tool suite, because this question is asking "which TOOL does he need to use for deauthentication." Singularly speaking.
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.