Identify the encryption algorithm based on eccouncil video

 ·  PT1H46M27S  ·  EN

ethical-hacker video for identify the encryption algorithm based on the given description: This wireless security algorithm was compromised by capturing

Full Certification Question

Identify the encryption algorithm based on the given description: This wireless security algorithm was compromised by capturing packets, allowing attackers to unveil the passkey within seconds. The vulnerability significantly impacted the TJ Maxx company, leading to a network breach and data theft through the exploitation of a technique known as wardriving.