Last Updated on August 16, 2021 by Admin
When investigating a wireless attack, what information can be obtained from the DHCP logs?
- The operating system of the attacker and victim computers
- IP traffic between the attacker and the victim
- MAC address of the attacker
- If any computers on the network are running in promiscuous mode