Which of the following commands should Steven use to generate authentication packets?
Steven is performing a wireless network audit. As part of the engagement, he is trying to crack a WPAPSK key. Steven has captured enough packets to run aircrack-ng and discover the key, but aircrack-ng did not yield any result, as there were no authentication packets in the capture. Which of...