An ___________________ attack speeds up a WEP Statistical Analysis attack by stimulating a lot of network traffic and forcing IV collisions.
ARP Request Replay
The ________ attack attempts to decrypt WPA/WPA2 protected traffic without recovering encryption key values. This is accomplished by reinstalling a previously used key stream by re-injecting message number ________ of the EAPOL 4-way handshake.
Krack, 3rd
The _____ method of configuration of WPS is vulnerable to online brute force attacks using the __________ tool or offline brute force attack using the _________ tool
PIN
Reaver
pixie dust
sing the reaver tool, it takes no more than ____________ tries to crack
11000