A company hires a penetration tester to test the security implementation of its wireless networks. The main goal for this assessment is to intercept and get access to sensitive data from the company's employees. Which of the following tools should the security professional use to best accomplish this task?
Correct Answer: B
The question specifies wireless network security assessment with the goal of intercepting sensitive employee data.
* WiFi-Pumpkin is specifically designed for Wi-Fi penetration testing. It can act as a rogue access point (evil twin attack) to trick users into connecting, then perform man-in-the-middle (MITM) attacks, traffic interception, credential harvesting, and phishing over Wi-Fi. This matches the goal of capturing sensitive employee data.
Why not the others?
* A. Metasploit: General exploitation framework, not specialized for Wi-Fi traffic interception.
* C. SET (Social-Engineer Toolkit): Used for phishing/social engineering, not wireless MITM.
* D. theHarvester: Information gathering tool for enumerating emails, subdomains, etc.
* E. WiGLE.net: Wireless network discovery database (maps SSIDs), not for active interception.
CompTIA PT0-003 Mapping:
* Domain 3.0: Attacks and Exploits
* 3.1: Exploit wireless network vulnerabilities (evil twin, rogue AP, MITM).